User behavior profile
First Claim
1. A computer-implementable method for generating a cyber behavior profile, comprising:
- monitoring electronically-observable user interactions, the electronically-observable user interactions comprising a behavior exhibited by a user that is observed through the use of at least one of an electronic device, a computer system and a software application executing on the computing system;
converting the electronically-observable user interactions into electronic information representing the electronically-observable user interactions, the electronic information representing the electronically-observable user interactions comprising multi-layered electronic information, each layer of the multi-layered electronic information corresponding to a respective layer of user interaction; and
generating a multi-dimensional cyber behavior profile based upon the multi-layered electronic information representing the user interactions;
identifying a known good interaction between the user and the information handling system;
storing a representation of the known good interaction between the user and the information handling system within the multi-dimensional cyber behavior profile as a known good user behavior element;
identifying an anomalous interaction between the user and the information handling system;
storing a representation of the anomalous interaction between the user and the information handling system within the multi-dimensional cyber behavior profile as a suspect user behavior element;
generating a user behavior profile score and a hash based upon the known good interaction and the anomalous interaction; and
,storing the user behavior profile score and the hash within the multi-dimensional cyber behavior profile.
6 Assignments
0 Petitions
Accused Products
Abstract
A method, system and computer-usable medium are disclosed for generating a cyber behavior profile comprising monitoring user interactions between a user and an information handling system; converting the user interactions into electronic information representing the user interactions, the electronic information representing the user interactions comprising multi-layered electronic information, each layer of the multi-layered electronic information corresponding to a respective layer of user interaction; and generating a unique multi-dimensional cyber behavior profile based upon the multi-layered electronic information representing the user interactions.
45 Citations
10 Claims
-
1. A computer-implementable method for generating a cyber behavior profile, comprising:
-
monitoring electronically-observable user interactions, the electronically-observable user interactions comprising a behavior exhibited by a user that is observed through the use of at least one of an electronic device, a computer system and a software application executing on the computing system; converting the electronically-observable user interactions into electronic information representing the electronically-observable user interactions, the electronic information representing the electronically-observable user interactions comprising multi-layered electronic information, each layer of the multi-layered electronic information corresponding to a respective layer of user interaction; and generating a multi-dimensional cyber behavior profile based upon the multi-layered electronic information representing the user interactions; identifying a known good interaction between the user and the information handling system; storing a representation of the known good interaction between the user and the information handling system within the multi-dimensional cyber behavior profile as a known good user behavior element; identifying an anomalous interaction between the user and the information handling system; storing a representation of the anomalous interaction between the user and the information handling system within the multi-dimensional cyber behavior profile as a suspect user behavior element; generating a user behavior profile score and a hash based upon the known good interaction and the anomalous interaction; and
,storing the user behavior profile score and the hash within the multi-dimensional cyber behavior profile. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
Specification