Discerning psychological state from correlated user behavior and contextual information
First Claim
1. A computer-implementable method for performing a psychological profile operation, comprising:
- monitoring user interactions between a user and an information handling system;
converting the user interactions into electronic information representing the user interactions, at least some of the user interactions being associated with corresponding user behaviors, at least some of the user interactions comprising a cyberprofile element;
identifying contextual information related to a particular user behavior, the particular user behavior comprising a focus of the user, the focus of the user providing contextual information for the particular user behavior, the contextual information including information related to content occurring at a particular point of focus, the point of focus providing a correlation between a particular instance of focus and an associated cyberprofile element, the particular instance of focus being associated with a time interval, each of a plurality of points of focus corresponding to respective cyberprofile elements, each of the plurality of points of focus being associated with respective time intervals;
determining when the user interactions are associated with generation of an electronic communication;
associating the user interactions with the electronic communication;
generating a psychological profile of the user based upon the user interactions, the contextual information, the plurality of points of focus, the correlation between the particular instances of focus and the associated cyber profile elements and the electronic communication, the psychological profile comprising information regarding a psychological state of the user;
performing an analysis of the psychological profile of the user to determine whether the user presents a security threat due to the psychological state of the user, the analysis being performed via a security analytics system executing on a hardware processor; and
,performing a threat remediation operation when the analysis of the psychological profile of the user indicates the user presents the security threat, the thread remediation operation being performed via the security analytics system.
6 Assignments
0 Petitions
Accused Products
Abstract
A method, system and computer-usable medium for performing a psychological profile operation. The psychological profile operation includes: monitoring user interactions between a user and an information handling system; converting the user interactions into electronic information representing the user interactions; determining when the user interactions are associated with generation of an electronic communication; associating the user interactions with the electronic communication; and, generating a psychological profile of the user based upon the user interactions and the electronic communication, the psychological profile comprising information regarding a psychological state of the user.
-
Citations
20 Claims
-
1. A computer-implementable method for performing a psychological profile operation, comprising:
-
monitoring user interactions between a user and an information handling system; converting the user interactions into electronic information representing the user interactions, at least some of the user interactions being associated with corresponding user behaviors, at least some of the user interactions comprising a cyberprofile element; identifying contextual information related to a particular user behavior, the particular user behavior comprising a focus of the user, the focus of the user providing contextual information for the particular user behavior, the contextual information including information related to content occurring at a particular point of focus, the point of focus providing a correlation between a particular instance of focus and an associated cyberprofile element, the particular instance of focus being associated with a time interval, each of a plurality of points of focus corresponding to respective cyberprofile elements, each of the plurality of points of focus being associated with respective time intervals; determining when the user interactions are associated with generation of an electronic communication; associating the user interactions with the electronic communication; generating a psychological profile of the user based upon the user interactions, the contextual information, the plurality of points of focus, the correlation between the particular instances of focus and the associated cyber profile elements and the electronic communication, the psychological profile comprising information regarding a psychological state of the user; performing an analysis of the psychological profile of the user to determine whether the user presents a security threat due to the psychological state of the user, the analysis being performed via a security analytics system executing on a hardware processor; and
,performing a threat remediation operation when the analysis of the psychological profile of the user indicates the user presents the security threat, the thread remediation operation being performed via the security analytics system. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A system comprising:
-
a processor; a data bus coupled to the processor; and a non-transitory, computer-readable storage medium embodying computer program code for performing a psychological profile operation, the non-transitory, computer-readable storage medium being coupled to the data bus, the computer program code interacting with a plurality of computer operations and comprising instructions executable by the processor and configured for; monitoring user interactions between a user and an information handling system; converting the user interactions into electronic information representing the user interactions, at least some of the user interactions being associated with corresponding user behaviors, at least some of the user interactions comprising a cyberprofile element; identifying contextual information related to a particular user behavior, the particular user behavior comprising a focus of the user, the focus of the user providing contextual information for the particular user behavior, the contextual information including information related to content occurring at a particular point of focus, the point of focus providing a correlation between a particular instance of focus and an associated cyberprofile element, the particular instance of focus being associated with a time interval, each of a plurality of points of focus corresponding to respective cyberprofile elements, each of the plurality of points of focus being associated with respective time intervals; determining when the user interactions are associated with generation of an electronic communication; associating the user interactions with the electronic communication; generating a psychological profile of the user based upon the user interactions, the contextual information, the plurality of points of focus, the correlation between the particular instances of focus and the associated cyber profile elements and the electronic communication, the psychological profile comprising information regarding a psychological state of the user performing an analysis of the psychological profile of the user to determine whether the user presents a security threat due to the psychological state of the user, the analysis being performed via a security analytics system executing on a hardware processor; and
,performing a threat remediation operation when the analysis of the psychological profile of the user indicates the user presents the security threat, the thread remediation operation being performed via the security analytics system. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A non-transitory, computer-readable storage medium embodying computer program code for performing a psychological profile operation, the computer program code comprising computer executable instructions configured for:
-
monitoring user interactions between a user and an information handling system; converting the user interactions into electronic information representing the user interactions, at least some of the user interactions being associated with corresponding user behaviors, at least some of the user interactions comprising a cyberprofile element; identifying contextual information related to a particular user behavior, the particular user behavior comprising a focus of the user, the focus of the user providing contextual information for the particular user behavior, the contextual information including information related to content occurring at a particular point of focus, the point of focus providing a correlation between a particular instance of focus and an associated cyberprofile element, the particular instance of focus being associated with a time interval, each of a plurality of points of focus corresponding to respective cyberprofile elements, each of the plurality of points of focus being associated with respective time intervals; determining when the user interactions are associated with generation of an electronic communication; associating the user interactions with the electronic communication; generating a psychological profile of the user based upon the user interactions, the contextual information, the plurality of points of focus, the correlation between the particular instances of focus and the associated cyber profile elements and the electronic communication, the psychological profile comprising information regarding a psychological state of the user; performing an analysis of the psychological profile of the user to determine whether the user presents a security threat due to the psychological state of the user, the analysis being performed via a security analytics system executing on a hardware processor; and
,performing a threat remediation operation when the analysis of the psychological profile of the user indicates the user presents the security threat, the thread remediation operation being performed via the security analytics system. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20)
-
Specification