SYSTEM AND METHOD FOR NORMALIZING AND MERGING CREDENTIAL STORES
First Claim
1. A computer-implemented method comprising:
- receiving, by a computing device, one or more data structures, wherein the one or more data structures include at least one or more user credentials;
normalizing, by the computing device, the one or more user credentials to generate a first graph;
analyzing, by the computing device, one or more nodes of the first graph and one or more nodes of at least a second graph, wherein analyzing includes at least identifying a logical correlation between the one or more nodes of the first graph and the one or more nodes of at least the second graph;
generating, by the computing device, a third graph based, at least in part, upon the analysis of the one or more nodes of the first graph and the one or more nodes of at least the second graph; and
generating, by the computing device, an output data structure based, at least in part, upon the third graph.
6 Assignments
0 Petitions
Accused Products
Abstract
One or more data structures are received by a computing device, wherein the one or more data structures include at least one or more user credentials. The one or more user credentials are normalized by the computing device to generate a first graph. One or more nodes of the first graph and one or more nodes of at least a second graph are analyzed by the computing device, wherein analyzing includes at least identifying a logical correlation between the one or more nodes of the first graph and the one or more nodes of at least the second graph. A third graph is generated by the computing device based, at least in part, upon the analysis of the one or more nodes of the first graph and the one or more nodes of at least the second graph. An output data structure is generated by the computing device based, at least in part, upon the third graph.
39 Citations
25 Claims
-
1. A computer-implemented method comprising:
-
receiving, by a computing device, one or more data structures, wherein the one or more data structures include at least one or more user credentials; normalizing, by the computing device, the one or more user credentials to generate a first graph; analyzing, by the computing device, one or more nodes of the first graph and one or more nodes of at least a second graph, wherein analyzing includes at least identifying a logical correlation between the one or more nodes of the first graph and the one or more nodes of at least the second graph; generating, by the computing device, a third graph based, at least in part, upon the analysis of the one or more nodes of the first graph and the one or more nodes of at least the second graph; and generating, by the computing device, an output data structure based, at least in part, upon the third graph. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A computer program product residing on a computer readable medium having a plurality of instructions stored thereon which, when executed by a processor, cause the processor to perform operations comprising:
-
receiving, by a computing device, one or more data structures, wherein the one or more data structures include at least one or more user credentials;
normalizing, by the computing device, the one or more user credentials to generate a first graph;analyzing, by the computing device, one or more nodes of the first graph and one or more nodes of at least a second graph, wherein analyzing includes at least identifying a logical correlation between the one or more nodes of the first graph and the one or more nodes of at least the second graph; generating, by the computing device, a third graph based, at least in part, upon the analysis of the one or more nodes of the first graph and the one or more nodes of at least the second graph; and generating, by the computing device, an output data structure based, at least in part, upon the third graph. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17)
-
-
18. A computing system comprising:
-
a processor; a memory module coupled with the processor; a first software module executable by the processor and the memory module, wherein the first software module is configured to receive one or more data structures, wherein the one or more data structures include at least one or more user credentials; a second software module executable by the processor and the memory module, wherein the second software module is configured to normalize the one or more user credentials to generate a first graph; a third software module executable by the processor and the memory module, wherein the third software module is configured to analyze one or more nodes of the first graph and one or more nodes of at least a second graph, wherein analyzing includes at least identifying a logical correlation between the one or more nodes of the first graph and the one or more nodes of at least the second graph; a fourth software module executable by the processor and the memory module, wherein the fourth software module is configured to generate a third graph based, at least in part, upon the analysis of the one or more nodes of the first graph and the one or more nodes of at least the second graph; and a fifth software module executable by the processor and the memory module, wherein the fifth software module is configured to generate an output data structure based, at least in part, upon the third graph. - View Dependent Claims (19, 20, 21, 22, 23, 24, 25)
-
Specification