Patent attributes
A method and system to utilize a user's activities pattern on a user equipment (UE) device as an additional authentication parameter are disclosed. The method includes monitoring, at the UE device, activities of the UE device, and generating, at the UE device, at least one pattern based on analysis of the monitored activities of the UE device. The method further includes receiving, at the UE device, a request to access a protected application. The method includes comparing, at the UE device, an activity of the UE device with an activity determined from the at least one pattern and a corresponding time data associated with the request to access the protected application. The method further includes determining, at the UE device, a level of authentication necessary to grant access to the protected application based on the comparing.