Multi-Factor Profile and Security Fingerprint Analysis
First Claim
1. A method to generate an identity fingerprint, comprising:
- retrieving at least one record from a data store of records based at least on a profile corresponding to one or more users, the profile comprising a specification of records from the data store, and the records relating to historical activities of the one or more users; and
converting the at least one retrieved record into a set of data; and
generating an identity fingerprint from the converted set of data.
7 Assignments
0 Petitions
Accused Products
Abstract
A security fingerprint architecture is disclosed. A security fingerprint comprises one or more behavioral factors which store a history of events associated with one or more users. The data in the security fingerprint is exposed by one or more modes, each of which determines the conditions that data in the security fingerprint may be accessed. Security fingerprints support a number of primitive operations that allow set operations to be performed. Security fingerprints may be used in for authentication, advertising, and other operations either alone, or in conjunction with third party data sources. An exemplary platform of security fingerprints built upon a cellular infrastructure is also disclosed.
154 Citations
27 Claims
-
1. A method to generate an identity fingerprint, comprising:
-
retrieving at least one record from a data store of records based at least on a profile corresponding to one or more users, the profile comprising a specification of records from the data store, and the records relating to historical activities of the one or more users; and converting the at least one retrieved record into a set of data; and generating an identity fingerprint from the converted set of data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system to selectively present a set of data, comprising:
-
a processor; a memory; an identity fingerprint stored in the memory, the identity fingerprint including; a set of data, a plurality of modes, each mode specifying a subset of the set of data that is exposed for querying, and a mode selector operable to select one of the plurality of modes; and a primitive operator stored in the memory and executable by the processor to receive at least the identity fingerprint, and perform any one or more of the following; generate a value, from the identity fingerprint; transform the identity fingerprint;
orgenerate one or more other identity fingerprints. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20, 21)
-
-
22. A method to generate an identity fingerprint, comprising:
-
retrieving records corresponding to a memory impaired patient from a data store of records based on a profile corresponding to the memory impaired patient, the profile comprising a specification of a first mode for a patient, a second mode for a family member, and a third mode for a medical caregiver; encrypting the retrieved records into a set of data such that the that the set of data configured to be selectively queried according to at least one of the first, second, or third modes; and generating an identity fingerprint based at least in part on the set of data and the first, second, and third modes.
-
-
23. A method to calculate a confidence score during an authentication operation, comprising:
-
receiving indicia of user activity and a security fingerprint; identifying a confidence score associated with the security fingerprint, the confidence score associated with one or more factors; retrieving from the security fingerprint confidence score factors available from the security fingerprint; identifying third party data sources for confidence score factors not available from the security fingerprint; retrieving from the identified third party data sources confidence score factors not available from the security fingerprint; and calculating the confidence score using at least one confidence score factor retrieved from the security fingerprint and one confidence score factor retrieved from an identified third party data source. - View Dependent Claims (24)
-
-
25. A method of generating an aggregated security fingerprint, comprising:
-
receiving a target profile comprising of one or more behavioral factors, each associated with a respective value range; receiving a condition upon which aggregation is to be performed; receiving a notification that the condition has been satisfied; responsive to the notification, querying a security profile data store for one or more security fingerprints satisfying the target profile, and aggregating the retrieved security fingerprints into a single aggregated security fingerprint.
-
-
26. A method of generating a security fingerprint supporting conditional queries, comprising:
-
receiving one or more security fingerprints; extracting behavioral factors from the one or more security fingerprints according to a predetermined heuristic, the heuristic associated with a confidence level; and generating a security fingerprint from at least some of the behavior factors and the confidence score, such that the behavioral factors may be queried based at least in part of the confidence level.
-
-
27. A method of conditionally querying a security fingerprint, comprising:
-
receiving a security fingerprint, the security fingerprint comprising one or more behavioral factors and a confidence level; receiving a query associated with a query confidence level; and if the query confidence level meets or exceeds the confidence level of the security fingerprint, retrieving the behavioral factors according to the query, and otherwise if the query confidence level does not meet or exceed the confidence level of the security fingerprint, returning an error message.
-
Specification