Patent attributes
Systems and methods of authorizing access to access-controlled environments are provided. In one example, a method includes receiving, passively by a computing device, user behavior authentication information indicative of a behavior of a user of the computing device, comparing, by the computing device, the user behavior authentication information to a stored user identifier associated with the user, calculating, by the computing device, a user identity probability based on the comparison of the user behavior authentication information to the stored user identifier, receiving, by the computing device, a request from the user to execute an access-controlled function, and granting, by the computing device, the request from the user responsive to determining that the user identity probability satisfies a first identity probability threshold associated with the access-controlled function.