Multi-Factor Identity Fingerprinting with User Behavior
First Claim
1. A method to generate an identity fingerprint, the method comprising:
- maintaining a data store of records, the records relating to historical activities by a plurality of users and the records having been aggregated according to a behavioral correlation model;
receiving an identity fingerprint request to generate an identity fingerprint for a user, the request comprising indicia of the user'"'"'s activity;
retrieving at least one record from the data store corresponding to the indicia of the user'"'"'s activity in the identity fingerprint request;
generating an identity fingerprint from the at least one retrieved record; and
serving the generated identity fingerprint responsive to the received identity fingerprint request.
5 Assignments
0 Petitions
Accused Products
Abstract
Multi-factor identity fingerprinting with user behavior is disclosed. A user'"'"'s interactions with one or more parties are tracked and stored in a data store. A party may be a company itself or a company'"'"'s information system. The user interactions are aggregated in a user profile bound to a particular user. All of the profile, or some subset of the profile may be used to generate an identity fingerprint. The identity fingerprint may be used as authentication credentials, where the similarity of user activity indicia is measured against all or part of the identity fingerprint. Alternatively, the aggregation systems may identify groups or categories of users by behavior by identifying similar identity fingerprints. Similarity may be measured via correlation models. Finally, the data store of profiles may be used for non-authentication systems such as business intelligence, advertising, identity management, and threat monitoring.
213 Citations
28 Claims
-
1. A method to generate an identity fingerprint, the method comprising:
-
maintaining a data store of records, the records relating to historical activities by a plurality of users and the records having been aggregated according to a behavioral correlation model; receiving an identity fingerprint request to generate an identity fingerprint for a user, the request comprising indicia of the user'"'"'s activity; retrieving at least one record from the data store corresponding to the indicia of the user'"'"'s activity in the identity fingerprint request; generating an identity fingerprint from the at least one retrieved record; and serving the generated identity fingerprint responsive to the received identity fingerprint request. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method to collect behavioral data for generating identity fingerprints, the method comprising:
-
receiving a session initiation request, the session initiation request comprising a user identifier; activating a user profile corresponding to the user identifier, the user profile comprising a plurality of events of interest; transmitting the plurality of events of interest to the client device for registration; receiving a plurality of user historical activity indicia, each indicia corresponding to at least one event registered on the client device responsive to a user input triggering at least one registered event; converting the received plurality of user historical activity indicia into a format specified by a correlation model; storing the user historical activity indicia in a data store with other user historical activity indicia from other sessions; and aggregating the user historical activity indicia according to the correlation model. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A method to track user behavioral, the method comprising:
-
receiving at a client device a plurality of events of interest; registering the plurality of events of interest with the client device, such that the client device is operative to track each of the plurality of events; collecting indicia corresponding to a registered event upon detecting a registered event; converting the indicia into a format specified by a correlation model; and transmitting the indicia. - View Dependent Claims (14)
-
-
15. A method of aggregating users into categories, the method comprising:
-
maintaining a data store of records, the records relating to historical activities by a plurality of users; generating an identity fingerprint for each of the plurality of users, each identity fingerprint having been generated according to an aggregate of records according to a behavioral correlation model; and aggregating the identity fingerprints into categories according to a similarity measure. - View Dependent Claims (16, 17, 18)
-
-
19. A method to authenticate an identity of a user, the method comprising:
-
receiving at least one indicia of a user'"'"'s activity; preparing an authentication request, the authentication request comprising the at least one indicia of the user'"'"'s activity; sending the prepared authentication request to a profiling service, the profiling service having access to a data store of records, the records relating to historical activities by a plurality of users; and receiving an authentication determination based on whether the indicia of the user'"'"'s activity in the authentication request correlates to at least one record in the data store, the correlating of the authentication request to the at least one record being based at least in part on a correlation model. - View Dependent Claims (20)
-
-
21. A system to generate identity fingerprints, the system comprising:
-
a profile collection service hosted on a computing device; a profile based authentication service hosted on a computing device, operably connected to the profile collection service; and a data store hosted on a computing device and operably connected to the profile collection service, wherein; the profile collection service is operable to receive correlation model information from the profile based authentication service, to transmit event information according to the correlation model, to receive user historical indicia according to the correlation model, and to store the received user historical indicia in the data store, the profile collection service is operable to generate an identity fingerprint based on some of the stored user historical indicia, and the profile collection service is operable to serve at least one generated identity fingerprint. - View Dependent Claims (22, 23, 24)
-
-
25. A system to generate identity fingerprints, the system comprising:
-
a set of user information sources hosted on a computing device; and a set of data services hosted on a computing device, the data services comprising an extract-transform-load (“
ETL”
) module, an ETL model, a data store, a profiling service, and a correlation model, wherein;the ETL module operably connected to the set of user information sources to receive user information; the ETL module operably connected to the ETL model and the data store, the ETL module to transform the received user information and store in the data store according to the ETL model; and the profiling service operably connected to the correlation model and the data store to generate an identity fingerprint from the transformed user information in the data store according to the correlation model. - View Dependent Claims (26, 27)
-
-
28. A system to authenticate user requests via an identity fingerprint, the system comprising:
-
a billing gateway hosted on a computing device; a service delivery gateway hosted on a computing device operably connected to the billing gateway; a content provider application hosted on a computing device operably connected to the billing gateway and the service delivery gateway; and a profiling service hosted on a computing device operably connected to the service delivery gateway, wherein; the content provider application operable to send an authentication request to the service delivery upon receiving a content request; the service delivery gateway operable to send an authentication request to the profiling service; the service delivery gateway operable to notify the billing gateway to perform a billing operation based on a received authentication result from the profiling service, and to notify the content provider of the billing operation result; the service delivery gateway operable to notify the content provider of the received authentication result; and the content provider operable to serve content based on the received authentication result from the service delivery gateway and the billing operation result from the billing gateway.
-
Specification