Systems and methods for using motion pattern of a user for authentication

ABSTRACT

Systems and methods for using accelerations derived from a motion pattern for multi-factor authentication, the method including receiving, filtering, and determining an identifying pattern from acceleration data representative of the user and using the identifying pattern for secured access authentication.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. application Ser. No.16/040,210, filed Jul. 19, 2018, now pending, which is incorporatedherein by reference in its entirety.

TECHNICAL FIELD

The disclosed embodiments generally relate to systems and methods forusing a motion pattern of a user as an identification factor for securedaccess authentication.

BACKGROUND

Multi-factor authentication is a method of confirming a user's identityonly after successfully presenting two or more factors to anauthentication mechanism. The factors may include: knowledge, somethingthe user and only the user knows; possession, something the user andonly the user has; and inherence, something the user and only the useris. Two-factor authentication is one type of multi-factorauthentication. It is a method of confirming a user's claimed identityby utilizing a combination of two factors. For example, a two factorauthentication may be required for withdrawing money from an automatedteller machine: only the correct combination of a bank card, somethingthat the user possesses, and a personal identification number, somethingthat the user knows, allows the automated teller transaction to becarried out.

As something inherent to the user, biometric factors are beingincreasingly used as one factor in a multi-factor authentication processbecause biometrics cannot easily be replicated or stolen by a thirdparty. Physical attributes like voice, smell, fingerprints, heartbeats,facial recognition, hand geometry, and retina scanning are examples ofcurrently used biometric factors.

A physical access control system is one way to protect people, propertyand assets, by tracking and restricting door or gate entry to aproperty, building, or room to authorized persons. Key cards and keyfobs that unlock doors are common access control systems providing theability to restrict access to authorized possessors of the key cards orfobs. Many organizations utilize access cards for employees to enterrestricted areas. Access cards, however, can be easily hacked. Manyinexpensive devices are available for any person to purchase,potentially giving many people the ability to steal and replicate keycards. While many business and other institutions have robust securityfor their servers and data clouds, they often overlook the possibilitythat an unauthorized person may replicate an access card and enter theirpremises. There is currently a need for improved security for usingaccess cards.

SUMMARY

In one embodiment, a system for authenticating secured access includesone or more memory devices storing instructions, one or more processorsconfigured to execute the instructions to: receive, from an access card,acceleration data associated with a motion pattern of an access card,the motion pattern being performed by a user having the access card,filter the received acceleration data, the filtered acceleration databeing representative of the user, determine an identifying pattern fromthe filtered acceleration data, compare the determined identifyingpattern of the user with a reference identifying pattern, andauthenticate an identity of the user based on the comparison between thedetermined identifying pattern and the reference identifying pattern.

In another embodiment, a method for authenticating secured accessincludes receiving acceleration data associated with a motion pattern ofan access card, the motion pattern being performed by a user having theaccess card, filtering the received acceleration data, the filteredacceleration data being representative of the user, determining anidentifying pattern from the filtered acceleration data, comparing thedetermined identifying pattern of the user with a reference identifyingpattern, and authenticating an identity of the user based on thecomparison between the determined identifying pattern and the referenceidentifying pattern.

In another embodiment, a non-transitory computer-readable storage mediumstoring instructions that are executable by at least one processor toauthenticate secured access. The instructions, when executed by aprocessor, cause the computer to perform the steps of receiving,acceleration data associated with a motion pattern of an access card,the motion pattern being performed by a user having the access card,filtering the received data, the filtered acceleration data beingrepresentative of the user, determining an identifying pattern from thefiltered acceleration data, comparing the determined identifying patternof the user with a reference identifying pattern, and authenticating anidentity of the user based on the comparison between the determinedidentifying pattern and the reference identifying pattern.

BRIEF DESCRIPTION OF THE DRAWING

The accompanying drawings, which are incorporated in and constitute apart of this specification, illustrate disclosed embodiments and,together with the description, serve to explain the disclosedembodiments. In the drawings:

FIG. 1 is a block diagram of an exemplary system, consistent withdisclosed embodiments;

FIG. 2 is a block diagram of an exemplary server, consistent withdisclosed embodiments;

FIG. 3 is a block diagram of an exemplary access card, consistent withdisclosed embodiments;

FIG. 4 is a block diagram of an exemplary secured access device,consistent with disclosed embodiments;

FIG. 5 is a flow chart of an exemplary process for authenticating auser, consistent with disclosed embodiments; and

FIG. 6. is a flow chart of an exemplary process performed by access card110, consistent with disclosed embodiments.

DETAILED DESCRIPTION

Reference will now be made in detail to the disclosed embodiments,examples of which are illustrated in the accompanying figures. Thedisclosed systems and methods relate to using motion patterns as abiometric identification factor for authentication using an electronicaccess card.

The term “access card,” as used herein may refer to a physical productthat is configured to provide information, such as financial information(e.g., card numbers, account numbers, etc.), quasi-financial information(e.g., rewards balance, discount information, etc.) and/orindividual-identifying information (e.g., name, address, etc.), when thecard is read by a card reader. Examples of access cards may also includetransaction cards, such as credit cards, debit cards, gift cards,rewards cards, frequent flyer cards, merchant-specific cards, discountcards, identification cards, membership cards, and driver's licenses,but are not limited thereto. The physical properties of the transactioncard (e.g., size, flexibility, location of various components includedin the card) may meet various international standards, including, e.g.,ISO/IEC 7810, ISO/IEC 7811, ISO/IEC 7812, ISO/IEC 7813, ISO/ISC 7816,ISO 8583, ISO/IEC 4909, and ISO/IEC 14443. For example, a transactioncard may have dimensions of 85.60 mm (width) by 53.98 mm (height) by0.76 mm (thickness), as specified in ISO/IEC 7810.

Disclosed embodiments include systems and methods for authenticatingsecured access using an access card and a secured access device. Forexample, an access card may be used to restrict access to a securedlocation to authorized persons.

FIG. 1 is a block diagram illustrating an exemplary system 100 that maybe configured for performing authentication consistent with disclosedembodiments. As shown, system 100 includes an access card 110, a securedaccess device 120, and a server 150, which are communicatively coupledby a network 130. Access card 110 is for use by a user 140 to beauthenticated by secured access device 120 for access to a securedlocation. While only one access card 110 and secured access device 120are shown, it will be understood that system 100 may include more thanone access card 110, secured access device 120, and user 140.

Each of access card 110, secured access device 120, and server 150 maybe a computing system configured to provide, use, and/or process userdata. As further described herein, access card 110, secured accessdevice 120, and server 150 may include one or more computing devices(e.g., computer(s), server(s), embedded systems), and memory storingdata and/or software instructions (e.g., database(s), memory devices).In some embodiments, the one or more computing devices are configured toexecute software instructions stored on one or more memory devices toperform one or more operations consistent with the disclosedembodiments. Access card 110 and secured access device 120 may beconfigured to communicate with each other. In certain aspects, securedaccess device 120 may communicate with other systems or computingdevices. In certain aspects, users may operate one or more of devices110 and 120 to initiate one or more operations consistent with disclosedembodiments. For example, access card 110 may be operated by user 140.User 140 may be an owner/operator of access card 110 and/or securedaccess device 120, such as a customer or employee of one or moreentities associated with secured access device 120. In other aspects,user 140 may be an employee of, or associated with, an entitycorresponding to access card 110 and/or secured access device 120, e.g.,someone authorized to use underlying computer systems or otherwise acton behalf of the entity. In other aspects, user 140 may not be anemployee or otherwise associated with the underlying entity. In someaspects, user 140 may be an entity, rather than an individual(s),associated with the secured access device 120.

Access card 110 may be associated with user 140. In some embodiments,access card 110 may include software that, when executed by a processor,performs known internet-related communication processes. In someembodiments, access card 110 may include a data storage componentdisposed in the card. As used herein, a “data storage component” may beor include one or more devices configured to receive, store, process,provide, transfer, send, delete, and/or generate data or otherinformation. For example, the data storage component may include amicrochip (e.g., EMV chip), a communication component or device (e.g.,Near Field Communication (NFC) antenna, radiofrequency identification(RFID) device, Bluetooth® device, WiFi device), a magnetic strip, abarcode, a Quick Response (QR) code, and/or other devices. The datastorage component may be configured to store information in acomputer-readable format. For example, the data storage component may beconfigured to store information in a format that can be read by securedaccess device 120.

Secured access device 120 may be associated with any entity thatrequires security, for example, an entity that regulates the entry/exitof persons from a secured location. The entity may be a financialservice provider, which may be a bank, credit union, credit card issuer,or other type of financial service entity that generates, provides,manages, and/or maintains financial service accounts for one or morecustomers. The entity may be any provider of goods and/or services. Forexample, the entity may be a hospital, university, business, gatedcommunity, apartment complex, self-storage, and/or school, among otherentities. The entity associated with secured access device 120 may issueaccess card(s) to one or more user(s) 140.

Network 130 may be any type of network configured to providecommunications between components of system 100. For example, network130 may be any type of network (including infrastructure) that providescommunications, exchanges information, and/or facilitates the exchangeof information, such as the Internet, a Local Area Network, near fieldcommunication (NFC), or other suitable connection(s) that enables thesending and receiving of information between the components of system100. In other embodiments, one or more components of system 100 maycommunicate directly through a dedicated communication link(s) (notshown), such as a link between access card 110 and secured access device120.

Server 150 may include one or more processors, one or more memories, andone or more input/output devices. According to some embodiments, server150 may be an embedded system or similar computing device consistentwith disclosed embodiments.

FIG. 2 is an exemplary block diagram of server 150 for implementingembodiments consistent with the present disclosure. Variations of server150 may be used by access card 110 and secured access device 120.

In one embodiment, server 150 includes one or more processors 210, oneor more memories 220, and one or more input/output (I/O) devices 230.According to some embodiments, server 150 may be an embedded system orsimilar computing device consistent with disclosed embodiments. Server150 may be standalone, or it may be part of a subsystem, which may bepart of a larger system. For example, server 150 may representdistributed servers that are remotely located and communicate over anetwork (e.g., network 130) or a dedicated network, such as a LAN.Server 150 may communicate with secured access device 120 and/or accesscard 110.

Processor 210 may include one or more known processing devices, such asa microprocessor from the Core™, Pentium™ or Xeon™ family manufacturedby Intel™, the Turion™ family manufactured by AMD™, the “Ax” or “Sx”family manufactured by Apple™, or any of various processors manufacturedby Sun Microsystems, for example. Processor 210 may include one or moreknown digital signal processors (DSP). DPSs may include, among others,ASOCS ModemX processors, CEVA XC4000 processors, OMAP3 processors, ARMCortex-A8 and C6000 processors, and DSP Microchip Technology PIC24 baseddsPIC processors.

Memory 220 may include one or more storage devices configured to storeinstructions used by processor 210 to perform functions related todisclosed embodiments. For example, memory 220 may be configured withone or more software instructions, such as program(s) 240 that mayperform one or more operations when executed by processor 210. Thedisclosed embodiments are not limited to separate programs or computersconfigured to perform dedicated tasks. For example, memory 220 mayinclude a single program 240 that embodies the functions of server 150,or program 240 could comprise multiple programs. Additionally, processor210 may execute one or more programs located remotely from server 150.For example, secured access device 120 may, via server 150, access oneor more remote programs that, when executed, perform functions relatedto certain disclosed embodiments. Memory 220 may also store data 250that reflects any type of information in any format that server 150 mayuse in system 100 to perform operations consistent with the disclosedembodiments.

I/O device 230 may be one or more devices configured to allow data to bereceived and/or transmitted by server 150. I/O devices 230 may includeone or more digital and/or analog communication devices that allowserver 150 to communicate with other machines and devices, such as othercomponents of system 100. For example, I/O device may be a generalpurpose computer used for sending and receiving data through network 130to and from access card 110 and/or secured access device 120.

Server 150 may also be communicatively connected to one or moredatabase(s) 260. Server 150 may be communicatively connected todatabase(s) 260 through network 130. Database 260 may include one ormore memory devices that store information and are accessed and/ormanaged through server 150. By way of example, database(s) 260 mayinclude Oracle™ databases, Sybase™ database, or other relationaldatabases or non-relational databases, such as Hadoop sequences files,HBase, or Cassandra. The databases or other files may include, forexample, data and information related to the source and destination of anetwork request, the data contained in the request, etc. Systems andmethods of the disclosed embodiments, however, are not limited toseparate databases. In one aspect, server 150 may include database 260.Alternatively, database 260 may be located remotely from server 150.Database 260 may include computing components (e.g., database managementsystem, database server, etc.) configured to receive and processrequests for data stored in memory devices of database(s) 260 and toprovide data from database 260.

FIG. 3 is an exemplary block diagram of access card 110 for implementingembodiments consistent with the present disclosure. In some embodiments,access card 110 may include one or more data storage components 310, andone or more processors 320, and one or more accelerometers 330 disposedin the card. As used herein, a “data storage component” may be orinclude one or more devices configured to receive, store, process,provide, transfer, send, delete, and/or generate data or otherinformation. For example, data storage component 310 may include amicrochip (e.g., EMV chip), a communication component or device (e.g.,Near Field Communication (NFC) antenna, radiofrequency identification(RFID) device, Bluetooth® device, WiFi device), a magnetic strip, abarcode, a Quick Response (QR) code, and/or other devices. Data storagecomponent 310 may be configured to store information in acomputer-readable format. For example, data storage device may beconfigured to store information in a format that can be read by securedaccess device 120.

Processor(s) 320 may include one or more known processing devices, suchas a microprocessor from the Core™, Pentium™ or Xeon™ familymanufactured by Intel™, the Turion™ family manufactured by AMD™, the“Ax” or “Sx” family manufactured by Apple™, or any of various processorsmanufactured by Sun Microsystems, for example. Processor(s) 320 mayinclude one or more known digital signal processors (DSP). DPSs mayinclude, among others, ASOCS ModemX processors, CEVA XC4000 processors,OMAP3 processors, ARM Cortex-A8 and C6000 processors, and DSP MicrochipTechnology PIC24 based dsPIC.

Accelerometer 330 may include one or more known accelerometers, such asmicro electro mechanical (MEM) accelerometers. Accelerometer 330 may,for example, include an NXP MMA8451Q accelerometer or variants of theNXP MMA8451Q accelerometer.

FIG. 4 is an exemplary block diagram of secured access device 120 forimplementing embodiments consistent with the present disclosure. In oneembodiment, secured access device includes one or more processors 410, anetwork interface device 420, a memory 430, one or more programs 440,data 450, and a display screen 460.

Processor 410 may include one or more known processing devices, such asa microprocessor from the Core™, Pentium™ or Xeon™ family manufacturedby Intel™, the Turion™ family manufactured by AMD™, the “Ax” or “Sx”family manufactured by Apple™, or any of various processors manufacturedby Sun Microsystems, for example. Processor 410 may include one or moreknown digital signal processors (DSP). DPSs may include ASOCS ModemXprocessors, CEVA XC4000 processors, OMAP3 processors, ARM Cortex-A8 andC6000 processors, and Microchip Technology PIC24 based dsPIC processors.The disclosed embodiments are not limited to any type of processor(s)otherwise configured to meet the computing demands required of differentcomponents of secured access device 120.

Network interface 420 allows secured access device 120 to send andreceive information through network 130. Alternatively or additionally,network interface 420 may establish direct wired or wireless connectionbetween secured access device 120 and other system components, such asserver 150 or access card 110. In some embodiments, network interface420 may establish direct wired or wireless connection between securedaccess device 120 and other computing devices. For example, networkinterface device 420 may communicatively couple secured access device120 to computing devices associated with door locking mechanisms. Forexample, secured access device 120 may be communicatively coupled to acomputing system associated with an electronic deadbolt door lock, orelectronic magnetic door lock. Network interface 420 may include amicrochip (e.g., an EMV chip), a communication component or device(e.g., Near Field Communication (NFC) antenna, radiofrequencyidentification (RFID) device, Bluetooth® device, WiFi device), amagnetic strip, a barcode, a Quick Response (QR) code, and/or otherdevices.

Memory 430 may include one or more storage devices configured to storeinstructions used by processor 410 to perform functions related todisclosed embodiments. For example, memory 430 may be configured withone or more software instructions, such as program(s) 440 that performone or more operations when executed by processor 410. The disclosedembodiments are not limited to separate programs or computers configuredto perform dedicated tasks. For example, memory 430 may include a singleprogram(s) 440 that embodies the functions of secured access device 120,or program 440 could comprise multiple programs. Additionally, processor410 may execute one or more programs located remotely from securedaccess device 120. For example, access card 110 and secured accessdevice 120 may, via server 150, access one or more remote programs that,when executed, perform functions related to certain disclosedembodiments. Memory 430 may also store data 450 that reflects any typeof information in any format that secured access device 120 may use insystem 100 to perform operations consistent with disclosed embodiments.

Secured access device 120 may include a display screen 460, such as, forexample, a liquid crystal display (LCD), a light emitting diode screen(LED), an organic light emitting diode screens (OLED), a touch screen,or other known display screens. Display screen 460 may display variouskinds of information consistent with disclosed embodiments.

FIG. 5 is a flow chart of an exemplary process 500 performed by secureaccess device 120 for authenticating user 140. It should be understood,however, that the disclosed embodiments are not limited to the processesdisclosed herein, and may apply to other authentication events. Theexemplary disclosed embodiments may be applicable to any serviceprovided to user 140 where the identity of user 140 is authenticated.For example, the identity of user 140 may be authenticated for afinancial transaction, gaining secured access, sending or receivingconfidential information, etc.

Process 500 includes secured access device 120 receiving accelerationdata associated with the movement of access card 110 when user 140performs a gesture for purposes of authentication of user 140's identity(step 510). Prior to step 510, user 140 may approach a locked door thatonly authorized persons are allowed to enter. Upon approaching the door,user 140 may, for example, hold access card 110 in their hand or simplycarry access card 110 on their person, perform a gesture with their handholding access card 110 or a full body gesture, in order to authenticatetheir identity and thereby unlock the door and cross the door'sthreshold.

In some embodiments, data storage component(s) 310 disposed in accesscard 110 sends acceleration data corresponding to the gesture by user140 to secured access device 120. In some embodiments, user 140 willpossess access card 110 and perform a gesture, which may be a fully bodygesture. For example, user 140 may hold access card 110 in their hand,and draw a shape, a signature, a code word, or a motion that only user140 knows and only user 140 can perform reproducibly. For example, ahand written signature is one such gesture that only user 140 canperform reproducibly. Hand writing and written signatures are regardedas individual to a person. In certain aspects, user 140 may carry accesscard 110 in their pocket and perform one or more squats as theirgesture. The acceleration data derived from user 140 performing thegesture while possessing access card 110 is transferred by data storagecomponent(s) 310 to secured access device 120. In some embodiments,access card 110 communicates via data storage component(s) 310 withsecured access device 120 through network 130. Alternatively, forexample, access card 110 and secured access device 120 may directlycommunicate through Bluetooth modules respectively included in accesscard 110 and secured access device 120.

The acceleration data derived from user 140's gesture while possessingaccess card 110 functions as a biometric authentication factor. This isanother factor in addition to, for example, possession of access card110 for use in multi-factor authentication. For example, if user 140signs their name in the air while holding access card 110 in their hand,the acceleration data derived therefrom can be manipulated, e.g.,filtered and an identifying pattern determined therefrom, consistentwith the present disclosure, to serve as a biometric factor, providing afactor in addition to possession of access card 110 for authentication.For example, the acceleration data may be filtered by access card 110 orsecured access device 120. Because no two people are built exactlyalike, nor do they move exactly the same, the movement of the gesture byuser 140 associated with access card 110 will have accelerations perunit of time unique to user 140.

In some embodiments, user 140 may approach a security check point whichincludes a door and a door locking mechanism associated with securedaccess device 120. Secured access device 120 may display a message ondisplay screen 460 prompting user 140 to authenticate themselves. User140 may then perform their gesture while possessing access card 110. Bysimply asking user 140 to authenticate themselves, an unauthorized thirdparty who may have gained unauthorized possession of access card 110 maynot know that a gesture is required for authentication. This knowledgeof the gesture can also function as an additional factor in themulti-factor authentication.

In some embodiments, the acceleration data transferred from access card110 is raw, i.e., has not been processed by processor(s) 320. In suchembodiments, the raw acceleration data is filtered by secured accessdevice 120 (step 520). Processor(s) 410 can filter the acceleration dataderived from user 140's gesture, for example, by digital signalprocessing. Processor(s) 410 may therefore include a digital signalprocessor. For example, the raw acceleration data may include additionalacceleration data that is not representative of user 140's full bodygesture. Such data may be, for example, generated from accelerationsassociated with user 140's environment and/or the environmentsurrounding secured access device 120, which may include, for example,accelerations data generated from a building's heating, ventilation, andair-conditioning system. The acceleration data may be filtered, so thatonly accelerations resulting from user 140's gesture are collected andprocessed, for example by using stock linear quadratic estimation,commonly known as Kalman filtering.

The filtered acceleration data is normalized in the time domain andfrequency domain. The normalized acceleration data creates a data set ofindividual time based acceleration vectors which can be codified byassembling the acceleration data into normalized Hausdorff spacepatterns, which are representative of user 140's gesture and ultimatelyrepresentative of user 140's identity. The filtered acceleration dataderived from the full body gesture performed by user 140 whilepossessing access card 110 constitutes a determined identifying pattern(step 530). This determined identifying pattern can function as onefactor in a multi factor authentication.

In other embodiments, processor(s) 320 of access card 110 may filter theraw acceleration data in the manner described above. Access card 110would then transfer the filtered acceleration data, to secured accessdevice 120 and secured access device 120 may determine the identifyingpattern. Alternatively, access card 110 may filter the raw accelerationdata and determine the identifying pattern, and then send theidentifying pattern to secured access device 120.

Process 500 continues by comparing the identifying pattern derived fromthe gesture with an identifying pattern associated with user 140 that isstored in memory 430 in the secured access device 120 (step 540) and/orin memory 220 and/or database(s) 260 associated with server 150. Basedon a comparison between the stored identifying pattern and thedetermined identifying pattern, user 140 may be authenticated (step550). In some embodiments, processor 210 or 410 executes softwareinstructions to compare the determined identifying pattern with thestored identifying pattern. In certain aspects, the comparison must bewithin a predetermined confidence level, e.g., of 75%, 80%, 85%, 90%,95%, or 99% to authenticate the identity of user 140. For example, thedetermined identifying pattern must be compared to the storedidentifying pattern and be within a predetermined confidence level inorder to authenticate user 140.

In various embodiments, processor(s) 410 of secured access device 120may execute machine learning software when determining the identifyingpattern. In some embodiments, technology used for this purpose mayinclude Neural Networks, Hidden Markov Models, and Support VectorMachines. In various embodiments, acceleration data, associated withuser 140's movement of access card 110, may be measured by access card110 and converted into a vector in three-dimensional space. In someembodiments, timing associated with user 140's movement of access card110 and/or individual gestures may be monitored to determine auniformity (and/or one or more levels of uniformity) within the movementof each individual identifying pattern. For example, if the identifyingpattern had a confidence level over a predetermined threshold, forexample 75% or 90%, that the gesture was properly performed, then user140 could be authenticated. In other embodiments, the user is promptedto repeat the gesture when the identifying pattern does not meet theconfidence level over a predetermined threshold. In other embodiments,each time user 140 authenticated their identity, the filteredacceleration data could be stored in memory 430 associated with securedaccess device 120 and/or memory 220 associated with server 150 and usedto refine step 540. For example, the filtered acceleration data anddetermined identifying pattern may be stored in memory, such that eachsuccessive determined identifying pattern may be used as continued inputin training the machine learning model for variations. In otherembodiments, the filtered acceleration data and identifying pattern mayonly be added as inputs to the machine learning model when exceeding acertain threshold of confidence. In this manner, the secured accessdevice 120 can become more accurate over time in its determination ofwhether user 140 is truly the entity performing the gesture.

FIG. 6 is a flow chart of an exemplary process 600 performed by accesscard 110 for sending acceleration data derived from a motion pattern ofuser 140 for authentication, consistent with disclosed embodiments.

Access card 110 may collect acceleration data via one or moreaccelerometers 330 (step 610). Prior to step 610, user 140 may approacha locked door that only authorized persons are allowed to enter. Uponapproaching the door, user 140 may, for example, hold access card 110 intheir hand or simply carry access card 110 on their person, perform agesture with their hand holding access card 110 or a full body gesture,in order to authenticate their identity and thereby unlock the door andcross the door's threshold. Accelerometer(s) 330 may collect theaccelerations associated with the movement of access card 110 while thegesture or full body pattern is being performed by user 140.

In some embodiments, access card 110 may filter the raw accelerationdata collected in step 610 (step 620). For example, processor(s) 320 mayfilter the raw acceleration data as described above. After the rawacceleration data is filtered by processor(s) 320 on access card 110,the filtered acceleration data may be sent to secured access device 120(step 630). Additionally or alternatively, processor(s) 320 may executesoftware instructions to determine an identifying pattern from thefiltered acceleration data, which can subsequently be transferred tosecured access device 120. In some embodiments, the identifying patternis stored in data storage component 310 of access card 110, therebyallowing access card 110 to perform steps 510-550.

Alternatively, the acceleration data may be filtered (step 620) byprocessors 410 or 210 after the collected acceleration data is sent bydata storage component(s) 310 of access card 110 to secured accessdevice 120 or server 150, respectively.

In some embodiments, the stored identifying patterns are stored inmemory 430 of secured access device 120 and/or memory 220 of server 150.Multiple identifying patterns respectively associated with multipleusers possessing multiple access cards may be stored in memory 430 ofsecured access device 120 and/or memory 220 of server 150.

In some embodiments, processor(s) 410 or 210 execute softwareinstructions to compare the determined identifying pattern and thestored identifying pattern.

In some embodiments, secured access device 120 is associated with a doorlocking mechanism, such that secured access device 120 is able to lockand unlock a door associated with the door locking mechanism. Forexample, user 140 may approach a door whose locking mechanism iscommunicatively coupled to secured access device 120. The door lockingmechanism may be communicatively coupled to secured access devicethrough network 130 and/or components of server 150, or other directcommunication means including hardwired connection. In some embodiments,secured access device 120 may prompt user 140 to perform the identifyinggesture with access card 110. For example, secured access device 120 maydisplay a message on display screen 460 asking user 140 to perform theidentifying gesture with access card 110. The message may be displayedupon secured access device 120 communicating with access card 110, forexample through Bluetooth modules. In response, user 140 may performtheir identifying gesture and be authenticated consistent with thedisclosed embodiments. Upon authentication, secured access device 120may send instructions to the door locking mechanism to unlock to thedoor.

In some embodiments, the door locking mechanism may be anelectromagnetic lock, magnetic lock, or maglock, which includes anelectromagnet and an armature plate. In some embodiments, the lockingmechanism can be either “fail safe,” which are unlocked when power islost or “fail secure,” which remain locked when power is lost. The “failsafe” magnetic lock requires power to remain locked and typically is notsuitable for high security applications because it is possible todisable the lock by disrupting the power supply. Despite this, by addinga magnetic bond sensor to the lock and by using a power supply thatincludes a battery backup capability, some specialized higher securityapplications can be implemented. Magnetic locks possess a number ofadvantages over conventional locks, for example, their durability andquick operation are particularly suitable for high-traffic environmentswhere electronic authentication is necessary.

In some embodiments, the electromagnet portion of the lock is attachedto the door frame and an armature plate is attached to the door. The twocomponents are in contact when the door is closed. When theelectromagnet is energized, a current passing through the electromagnetcreates a magnetic flux that causes the armature plate to attract to theelectromagnet, creating a locking action. Because the mating area of theelectromagnet and armature is relatively large, the force created by themagnetic flux is strong enough to keep the door locked. In someembodiments, the electromagnetic lock has a holding force capacity of600 pounds. In other embodiments, the holding force capacity is 1,200pounds or 2,000 pounds or more. Because electromagnetic locks do notinteract with levers or door knobs on a door, typically a separaterelease button that cuts the lock power supply is mounted on the securedside of the door. The button usually has a timer that, once pressed,keeps the lock unlocked for a short period of time to enable exit fromthe secured side. For example, pressing the button may leave the doorunlocked for less than five seconds, 10 seconds, 15 seconds or more.

In some embodiments, the magnetic lock is part of an electronic securitysystem. Such a system may include secured access device 120communicatively coupled to an electromagnetic door locking mechanism andaccess card 110.

In various embodiments, user 140 may initially configure theiridentifying gesture. For example, user 140 may interact with access card110 and secured access device 120 through components of server 150 toconfigure an identifying gesture. For example, user 140 may perform theidentifying gesture with access card 110 repeatedly. The repeatedperformance of the gesture will set the maximum and minimums formeasured accelerations and time. During the initial configuration,access card 110 would collect acceleration data associated with thegesture. Access card 110 may then transfer the acceleration data tosecured access device 120 and/or components of server 150. Access card110 may process the raw acceleration data prior to transferring thedata. For example, processor(s) 320 may filter the acceleration datacollected by accelerometer(s) 330 and processor(s) 320 may determine anidentifying pattern and send the identifying pattern to secured accessdevice 120 or server 150. During the configuration process, the maximumand minimum accelerations, as well as the time length of each gesturecan be recorded. Additionally, accelerations due to the rotation ofaccess card 110 may be collected. For example, accelerations measuredfrom the movement of access card 110 may vary depending on the locationof accelerometer(s) 330. The location of accelerometer(s) 330 may beaccounted for during the filtering process. For example, user 140 may beinstructed to hold their card in a variety of ways (e.g., upside down,backwards, etc.), while performing the initial gesture, to informsecured access device 120 of how the gesture would be performed withdifferent variations of the placement of the accelerometers. In someembodiments, the location of the one or more accelerometers 330 onaccess card 110 may be considered when configuring the identifyingpattern. In some aspects, the rotational acceleration may differdepending on the location of the one or more accelerometer(s) 330.Filtering process 520 may account for the variation in rotationalacceleration due to the location of the one or more accelerometers 330.For instance, if the accelerometer 330 were on the bottom of access card110, and user 140 performed a gesture in which they rotated access card110 vertically using the bottom of access card 110 as the rotationalaxis, the data sent to secured access device 120 would have a smallerrotational circle than if the same gesture were performed withaccelerometer 330 placed on the top of access card 110 (or if accesscard 110 were held upside down when the gesture was performed).Filtering process 520 may have a step to normalize these rotations. Inother embodiments, user 140 performing the identifying gesture whileholding access card 110 in a variety of ways would inform secure accessdevice 120 of expected variations based on placement of theaccelerometers 330 on access card 110. In further embodiments, accesscard 110 may have multiple accelerometers 330 positioned to account forthese variations. In other embodiments, secured access device 120, whendetermining the identifying gesture, may take input from multipleaccelerometers 330, and calculate a single gesture. In some embodiments,the data from the multiple accelerometers 330 may be equally weighted.In other embodiments, the data from accelerometers 300 may be weighteddifferently.

In other embodiments, user 140 will have the opportunity to configuretheir identifying gesture and test to make sure that they can repeatablyperform their gesture and be authenticated. For example, afterconfiguring their gesture, user 140 may have the opportunity to confirmthat they can successfully authenticate their identity by performingtheir gesture in a testing context. For example, user 140 may performtheir gesture any number of times to confirm that the gesture iscorrectly configured. In addition, user 140 may test that the gesture iscorrectly configured by performing a different gesture and failing toauthenticate.

In various embodiments, secured access device 120 may be associated witha home security system. For example, user 140 may disarm a home securitysystem by performing the identifying gesture with access card 110.

The disclosed embodiments provide improvements to multi-factorauthentication by using accelerations derived from a gesture that onlyan authorized user knows for authentication. Specifically, in thecontext of secured access using access cards, the disclosed embodimentsprovide improvements by adding a biometric factor as an extra layer ofsecurity to the functioning of the access card. For example, knowledgeand inherence factors are added to the traditional access card system.Specifically, an authorized user of the access card has knowledge oftheir authenticating gesture. In addition to knowledge, performance ofthe gesture is inherent to the user. As mentioned above, no two personsare built or move exactly the same and, therefore, the accelerationsassociated with particular gestures are unique to each person. Thedisclosed systems and methods can take advantage of this reality byincorporating the performance of gestures into a multi-factorauthentication. Instead of one factor authentication, possession,associated with simply swiping an access card in a card reader to gainaccess, the disclosed embodiments combine knowledge and inherencefactors into the access card. A card holder must know what gesture isperformed for access and the card holder must be able to physicallyperform the gesture.

Additionally, because the access cards do not need to be swiped orotherwise contacted with a card reader, the disclosed access cards arenot exposed to the amount of wear and tear as a traditional access cardwhen swiping or otherwise contacting a card reader.

Computer programs based on the written description and methods of thisspecification are within the skill of a software developer. The variousprograms or program modules can be created using a variety ofprogramming techniques. For example, program sections or program modulescan be designed in or by means of Java, C, C++, assembly language, orany such programming languages. One or more of such software sections ormodules can be integrated into a computer system, computer-readablemedia, or existing communications software

Moreover, while illustrative embodiments have been described herein, thescope includes any and all embodiments having equivalent elements,modifications, omissions, combinations (e.g., of aspects acrossembodiments), adaptations or alterations based on the presentdisclosure. The elements in the claims are to be interpreted broadlybased on the language employed in the claims and not limited to examplesdescribed in the present specification or during the prosecution of theapplication, which examples are to be construed as non-exclusive.Further, the steps of the disclosed methods can be modified in anymanner, including by reordering steps or inserting or deleting steps. Itis intended, therefore, that the specification and examples beconsidered as example only, with a true scope and spirit being indicatedby the following claims and their full scope of equivalents.

What is claimed is:
 1. A system for generating a reference pattern forauthentication, comprising: one or more memory devices storinginstructions; and one or more processors remote from an access card, theone or more processors executing the instructions to perform operationscomprising: receiving first acceleration data from an accelerometer ofthe access card; detecting a first acceleration, based on the firstacceleration data; normalizing the first acceleration, based on aparticular placement of the accelerometer on the access card;determining a first identifying pattern based on the normalized firstacceleration; and storing the first identifying pattern as a referencepattern for authenticating an identity of a user.
 2. The system of claim1, wherein the operations further comprise: receiving secondacceleration data from an accelerometer of the access card; detecting asecond acceleration, based on the second acceleration data; normalizingthe second acceleration based on a coordinate system of the normalizedfirst acceleration; determining a second identifying pattern, based onthe normalized second acceleration; comparing the second identifyingpattern and the reference identifying pattern; and authenticating theidentity of the user based on a result of the comparison.
 3. The systemof claim 2, wherein authenticating the identity of the user comprises atleast one of approving a financial transaction, gaining secured access,or sending confidential information.
 4. The system of claim 2, whereinthe operations further comprise prompting the user to perform a gesturefor authentication.
 5. The system of claim 4, wherein prompting the userto perform a gesture comprises prompting the user to draw at least oneof a shape, a signature, or a code word.
 6. The system of claim 1,wherein: the operations further comprise filtering the firstacceleration data; and detecting the first acceleration comprisesdetecting the first acceleration, based on the filtered firstacceleration data.
 7. The system of claim 1, wherein the operationsfurther comprise storing a plurality of reference identifying patterns,each reference identifying pattern being associated with a differentuser.
 8. The system of claim 1, wherein the operations further comprisecommunicating with the access card via a near-field communicationcomponent.
 9. The system of claim 1, wherein the operations furthercomprise prompting the user to perform a gesture to configure areference identifying pattern.
 10. The system of claim 1, wherein theoperations further comprise: receiving information relating to theparticular placement of the accelerometer on the access card.
 11. Amethod for generating a reference pattern for authentication,comprising: receiving first acceleration data from an accelerometer ofan access card; detecting a first acceleration, based on the firstacceleration data; determining a particular placement of theaccelerometer on the access card; normalizing the first acceleration,based on the particular placement of the accelerometer; determining afirst identifying pattern, based on the normalized first acceleration;and storing the first identifying pattern as a reference pattern forauthenticating an identity of a user.
 12. The method of claim 11,further comprises: receiving second acceleration data from anaccelerometer of the access card; detecting a second acceleration, basedon the second acceleration data; normalizing the second accelerationinto a coordinate system of the normalized first acceleration;determining a second identifying pattern, based on the normalized secondacceleration; comparing the second identifying pattern and the referenceidentifying pattern; and authenticating the identity of the user basedon a result of the comparison.
 13. The method of claim 12, whereinauthenticating the identity of the user comprises at least one ofapproving a financial transaction, gaining secured access, or sendingconfidential information.
 14. The method of claim 12, further comprisingprompting the user to perform a gesture for authentication.
 15. Themethod of claim 14, wherein prompting the user to perform a gesturecomprises prompting the user to draw at least one of a shape, asignature, or a code word.
 16. The method of claim 11, wherein: themethod further comprises filtering the first acceleration data; anddetecting the first acceleration comprises detecting the firstacceleration, based on the filtered first acceleration data.
 17. Themethod of claim 11, wherein the method further comprises storing aplurality of reference identifying patterns, each reference identifyingpattern being associated with a different user.
 18. The method of claim11, wherein the method further comprises communicating with the accesscard via a near-field communication component.
 19. The method of claim11, wherein the method further comprises prompting the user to perform agesture to configure a reference identifying pattern.
 20. Anon-transitory computer-readable storage medium storing instructionswhich, when executed by one or more processors, cause the one or moreprocessors to perform operations comprising: receiving acceleration datafrom an accelerometer of an access card; detecting an acceleration,based on the acceleration data; normalizing the acceleration, based on aparticular placement of the accelerometer on the access card;determining an identifying pattern, based on the normalizedacceleration; and storing the identifying pattern as a reference patternfor authenticating an identity of a user.