Behavioral profiling method and system to authenticate a user
First Claim
Patent Images
1. A computer-implemented method, comprising:
- monitoring a plurality of behavioral characteristics of user interactions with a first computing device;
identifying a subset of the plurality of behavioral characteristics to add to a block chain;
sending a request to add the subset of the plurality of behavioral characteristics to the block chain; and
identifying that the subset of the plurality of behavioral characteristics has been added to the block chain, by;
identifying a number of subsequent data records that have been added to the block chain after the subset of the plurality of behavioral characteristics was added; and
receiving an indication of a minimum number of data records to be added to the block chain.
0 Assignments
0 Petitions
Accused Products
Abstract
Methods and systems for behavioral profiling, and in particular, utilizing crowd-managed data architectures to store and manage that profile, are described. In some embodiments, a method includes observing behavioral characteristics of user interactions during a current session with the user through one of a plurality of channels. Variations between the behavioral characteristics of the user interactions observed during the current session and a behavioral profile previously developed based on prior usage patterns of the user through the plurality of channels are identified, in real-time or near real-time.
94 Citations
22 Claims
-
1. A computer-implemented method, comprising:
-
monitoring a plurality of behavioral characteristics of user interactions with a first computing device; identifying a subset of the plurality of behavioral characteristics to add to a block chain; sending a request to add the subset of the plurality of behavioral characteristics to the block chain; and identifying that the subset of the plurality of behavioral characteristics has been added to the block chain, by; identifying a number of subsequent data records that have been added to the block chain after the subset of the plurality of behavioral characteristics was added; and receiving an indication of a minimum number of data records to be added to the block chain. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A system, comprising:
-
a processor, a non-transitory computer readable memory coupled with the processor, the memory comprising executable instructions that when executed by the processor cause the processor to effectuate operations comprising; monitoring a plurality of behavioral characteristics of user interactions with a first computing device; identifying a subset of the plurality of behavioral characteristics to add to a block chain; sending a message to add the subset of the plurality of behavioral characteristics to the block chain; identifying that the subset of the plurality of behavioral characteristics has been added to the block chain, wherein the subset of the plurality of behavioral characteristics added to the block chain are encrypted; and authenticating the user, wherein authenticating the user comprises identifying variations between the plurality of behavioral characteristics of the user interactions and a behavior profile previously developed based on prior usage patterns of the user. - View Dependent Claims (15)
-
-
16. A non-transitory computer-readable storage medium comprising instructions that, when executed by a processor, cause the processor to effectuate operations comprising:
-
monitoring a plurality of behavioral characteristics of user interactions with a first computing device, wherein the user interactions are over a plurality of channels; identifying a subset of the plurality of behavioral characteristics to add to a block chain; generating encrypted behavioral characteristics via encrypting the subset of the plurality of behavioral characteristics; sending a message to add the encrypted behavioral characteristics to the block chain; identifying that the encrypted behavioral characteristics have been added to the block chain by; identifying a number of the subsequent data records that have been added to the block chain after the subset of the plurality of behavioral characteristics was added; receiving an indication of a minimum number of data records to be added to the block chain; and comparing the number of the subsequent data records added to the block chain to the minimum number; receiving an indication that a second computing device will store at least part of subsequent data records; and identifying variations between the plurality of behavioral characteristics of the user interactions and a behavior profile previously developed based on prior usage patterns of a user.
-
-
17. A computer-implemented method, comprising:
-
monitoring a plurality of behavioral characteristics of user interactions with a first computing device; identifying a subset of the plurality of behavioral characteristics to add to a block chain; sending a request to add the subset of the plurality of behavioral characteristics to the block chain; identifying that the subset of the plurality of behavioral characteristics has been added to the block chain; identifying a number of subsequent data records that have been added to the block chain after the subset of the plurality of behavioral characteristics was added; receiving an indication that a second computing device will store at least part of the subsequent data records; receiving an indication that, as a result of the second computing device storing at least part of the subsequent data records, an individual associated with the second computing device will receive a reward; and identifying a percentage of the subsequent data records that are stored on the second computing device. - View Dependent Claims (18, 19)
-
-
20. A computer-implemented method, comprising:
-
monitoring a plurality of behavioral characteristics of user interactions with a first computing device, wherein the user interactions relate to interactions between a user and the first computing device; identifying a subset of the plurality of behavioral characteristics to add to a block chain, wherein the subset of the plurality of behavioral characteristics added to the block chain are encrypted; sending a request to add the subset of the plurality of behavioral characteristics to the block chain; identifying that the subset of the plurality of behavioral characteristics has been added to the block chain; sending a decryption key to a company; and receiving notification that the company has utilized the decryption key to authenticate the user by identifying variations between the plurality of behavioral characteristics of the user interactions and a behavior profile that was previously developed and that is based on prior usage patterns of the user. - View Dependent Claims (21, 22)
-
Specification