Relationship Based Trust Verification Schema
First Claim
1. A computationally-implemented system comprising:
- circuitry for receiving at a computer device one or more behavioral fingerprints associated with one or more network accessible users;
circuitry for receiving an authentication request at the computer device, the authentication request associated with one or more proposed transactions of the one or more network accessible users; and
circuitry for transmitting from the computer device a decision associated with the authentication request, the decision based at least partially on a trust verification schema generated from a relational mapping of the one or more behavioral fingerprints associated with the one or more network accessible users.
5 Assignments
0 Petitions
Accused Products
Abstract
A computationally-implemented method, in accordance with certain example embodiments, may include, but is not limited to: receiving at a computer device one or more behavioral fingerprints associated with one or more network accessible users; receiving an authentication request at the computer device, the authentication request associated with one or more proposed transactions of the one or more network accessible users; and transmitting from the computer device a decision associated with the authentication request, the decision based at least partially on a trust verification schema generated from a relational mapping of the one or more behavioral fingerprints associated with the one or more network accessible users. In addition to the foregoing, other aspects are presented in the claims, drawings, and written description forming a part of the present disclosure.
123 Citations
44 Claims
-
1. A computationally-implemented system comprising:
-
circuitry for receiving at a computer device one or more behavioral fingerprints associated with one or more network accessible users; circuitry for receiving an authentication request at the computer device, the authentication request associated with one or more proposed transactions of the one or more network accessible users; and circuitry for transmitting from the computer device a decision associated with the authentication request, the decision based at least partially on a trust verification schema generated from a relational mapping of the one or more behavioral fingerprints associated with the one or more network accessible users. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21)
-
-
22. A computationally-implemented system comprising:
-
means for receiving at a computer device one or more behavioral fingerprints associated with one or more network accessible users; means for receiving an authentication request at the computer device, the authentication request associated with one or more proposed transactions of the one or more network accessible users; and means for transmitting from the computer device a decision associated with the authentication request, the decision based at least partially on a trust verification schema generated from a relational mapping of the one or more behavioral fingerprints associated with the one or more network accessible users.
-
-
23-42. -42. (canceled)
-
43. A method comprising:
-
receiving at a computer device one or more behavioral fingerprints associated with one or more network accessible users; receiving an authentication request at the computer device, the authentication request associated with one or more proposed transactions of the one or more network accessible users; and transmitting from the computer device a decision associated with the authentication request, the decision based at least partially on a trust verification schema generated from a relational mapping of the one or more behavioral fingerprints associated with the one or more network accessible users.
-
-
44-63. -63. (canceled)
Specification