Method of Criminal Profiling and Person Identification Using Cognitive/Behavioral Biometric Fingerprint Analysis
First Claim
1. A computer program product comprising at least one non-transitory computer-readable medium tangibly embodying a computer readable program within a computer system having internet and/or intranet connectivity, wherein the computer-readable program when executed:
- (i) initiates an authorization session and/or otherwise prompts a potential intruder with a cognitive fingerprint screen or page;
(ii) that calls for a response that requires specific measurable cognitive/behavioral biometrics;
(iii) the text of which includes one or more outside variables;
(iv) that comprise one or more unknown shared profiling secrets;
(v) receives and records each voluntary measurable response made;
(vi) plots the measureable response on a cognitive grid;
(vii) analyzes the response taking into consideration its'"'"' placement on the grid;
(viii) transforms each response that meets or exceeds a specified level of accuracy into an outside credential creating usable electric evidence;
(ix) generates data output regarding the outside credential;
(x) initiates a prescribed action based on the outside credential, and;
(xi) stores data in, and retrieves data from, a target storage area.
0 Assignments
0 Petitions
Accused Products
Abstract
A method of criminal profiling and person identification that utilizes an online identity software-based solution which focuses on the cognitive/behavioral aspects of an individual who is attempting to gain or has gained unauthorized access to a computer system or portions of that system, who may be posing as an authorized user of that system. There is an emphasis on identifying the intruder'"'"'s unique cognitive/behavioral biometric fingerprint while he is creating usable electronic evidence during his criminal behavior in cyberspace.
48 Citations
20 Claims
-
1. A computer program product comprising at least one non-transitory computer-readable medium tangibly embodying a computer readable program within a computer system having internet and/or intranet connectivity, wherein the computer-readable program when executed:
- (i) initiates an authorization session and/or otherwise prompts a potential intruder with a cognitive fingerprint screen or page;
(ii) that calls for a response that requires specific measurable cognitive/behavioral biometrics;
(iii) the text of which includes one or more outside variables;
(iv) that comprise one or more unknown shared profiling secrets;
(v) receives and records each voluntary measurable response made;
(vi) plots the measureable response on a cognitive grid;
(vii) analyzes the response taking into consideration its'"'"' placement on the grid;
(viii) transforms each response that meets or exceeds a specified level of accuracy into an outside credential creating usable electric evidence;
(ix) generates data output regarding the outside credential;
(x) initiates a prescribed action based on the outside credential, and;
(xi) stores data in, and retrieves data from, a target storage area. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
- (i) initiates an authorization session and/or otherwise prompts a potential intruder with a cognitive fingerprint screen or page;
Specification