Social network based trust verification Schema
First Claim
1. A computationally-implemented system comprising:
- means for receiving at a computing device one or more behavioral fingerprints associated with one or more network accessible users;
means for receiving an authentication request at the computing device, the authentication request associated with one or more proposed transactions of the one or more network accessible users; and
means for transmitting from the computing device a decision associated with the authentication request, the decision based on a trust verification schema generated by relationally mapping the one or more behavioral fingerprints associated with the one or more network accessible users.
5 Assignments
0 Petitions
Accused Products
Abstract
A computationally implemented method includes, but is not limited to: for receiving at a computing device one or more behavioral fingerprints associated with one or more network accessible users; receiving an authentication request at the computing device, the authentication request associated with one or more proposed transactions of the one or more network accessible users; and transmitting from the computing device a decision associated with the authentication request, the decision based on a trust verification schema generated by relationally mapping the one or more behavioral fingerprints associated with the one or more network accessible users. In addition to the foregoing, other method aspects are described in the claims, drawings, and text forming a part of the present disclosure.
-
Citations
43 Claims
-
1. A computationally-implemented system comprising:
-
means for receiving at a computing device one or more behavioral fingerprints associated with one or more network accessible users; means for receiving an authentication request at the computing device, the authentication request associated with one or more proposed transactions of the one or more network accessible users; and means for transmitting from the computing device a decision associated with the authentication request, the decision based on a trust verification schema generated by relationally mapping the one or more behavioral fingerprints associated with the one or more network accessible users.
-
-
2-20. -20. (canceled)
-
21. A computationally-implemented system, comprising:
-
circuitry for receiving at a computing device one or more behavioral fingerprints associated with one or more network accessible users; and circuitry for receiving an authentication request at the computing device, the authentication request associated with one or more proposed transactions of the one or more network accessible users; and circuitry for transmitting from the computing device a decision associated with the authentication request, the decision based on a trust verification schema generated by relationally mapping the one or more behavioral fingerprints associated with the one or more network accessible users. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41)
-
-
42. A computer program product comprising an article of manufacture bearing:
-
one or more instructions for receiving at a computing device one or more behavioral fingerprints associated with one or more network accessible users; and one or more instructions for receiving an authentication request at the computing device, the authentication request associated with one or more proposed transactions of the one or more network accessible users; and one or more instructions for transmitting from the computing device a decision associated with the authentication request, the decision based on a trust verification schema generated by relationally mapping the one or more behavioral fingerprints associated with the one or more network accessible users.
-
-
43-62. -62. (canceled)
Specification