System and method for identity consolidation
First Claim
Patent Images
1. A method for attributing user-authentication credentials to an individual, the method comprising:
- a) receiving a plurality of user-authentication credentials;
b) associating at least a subset of the plurality of user-authentication credentials based on consistencies in the authentication credentials and applications usage attributed thereto;
c) creating an identity signature based on the associated user-authentication credentials; and
d) attributing the identity signature to an individual.
7 Assignments
0 Petitions
Accused Products
Abstract
Application-specific and single-sign-on user-authentication credentials are analyzed and consolidated based on commonalities among the credentials and usage of the applications to which they are attributed.
110 Citations
30 Claims
-
1. A method for attributing user-authentication credentials to an individual, the method comprising:
-
a) receiving a plurality of user-authentication credentials; b) associating at least a subset of the plurality of user-authentication credentials based on consistencies in the authentication credentials and applications usage attributed thereto; c) creating an identity signature based on the associated user-authentication credentials; and d) attributing the identity signature to an individual. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 16)
-
-
15. A system for attributing computer system user-authentication credentials to an individual, the system comprising:
-
a) an identity signature data store for storing user-authentication credentials in connection with a plurality of computer applications; and b) a mapping module for creating a user signature based on the user-authentication credentials and mapping the user signature to an individual. - View Dependent Claims (17, 18)
-
-
19. An article of manufacture having computer-readable program portions embodied thereon for attributing user-authentication credentials to an individual, the article comprising computer-readable instructions for:
-
a) receiving a plurality of user-authentication credentials; b) associating a subset of the plurality of user-authentication credentials based on consistencies in the authentication credentials and applications usage attributed thereto; c) creating an identity signature based on the associated user-authentication credentials; and d) attributing the identity signature to an individual.
-
-
20. A method for attributing user-authentication credentials to an individual, the method comprising:
-
a) receiving a plurality of user-authentication credentials; b) monitoring activities of the user; and c) based on the monitored activities, inferentially determining whether a likelihood that a new activity is associated with the user exceeds a predetermined threshold. - View Dependent Claims (21, 22, 23)
-
-
24. A method of detecting shared usage of user-authentication credentials, the method comprising:
-
receiving a plurality of requests for access to a secure resource, each request comprising one or more user-authentication credentials; constructing a request profile for each request based at least in part on the provided user-authentication credentials; and identifying common user-authentication credentials received in two or more of the requests having different request profiles, thereby detecting shared usage of the one or more user-authentication credentials. - View Dependent Claims (25, 26, 27, 28, 29, 30)
-
Specification