×

Method and system for implementing and managing an enterprise identity management for distributed security in a computer system

  • US 8,010,562 B2
  • Filed: 01/25/2010
  • Issued: 08/30/2011
  • Est. Priority Date: 12/31/2002
  • Status: Expired due to Fees
First Claim
Patent Images

1. A system comprising:

  • a processor for facilitating management of user identities;

    a non-transitory memory communicating with the processor,the non-transitory memory having instructions stored thereon that, in response to execution by the processor, cause the processor to perform operations comprising;

    facilitating monitoring, by the processor, an account and an identity to verify an integrity of a relationship;

    determining, by the processor, a usage history of the identity based on a transaction being deemed a successful confirmation or unsuccessful confirmation of the relationship between the identity and the account;

    assigning, by the processor, a positive weight for a successful transaction by the identity associated with the account;

    assigning, by the processor, a negative weight for an unsuccessful transaction by the identity associated with the account;

    assigning, by the processor, a negative weight for a particular series of unsuccessful transactions by the identity associated with the account that exceeds an aggregate of individual negative weights of unsuccessful transactions that comprise the particular series of unsuccessful transactions by the identity associated with the account;

    aggregating, by the processor, the positive and negative weights to determine usage history of the identity of the user;

    determining, by the processor, a likelihood a claimed identity is an owner of the account by converting the aggregation of positive and negative weights to a probability score;

    facilitating, by the processor, periodic confirmation of ownership information from the user;

    facilitating maintaining and modifying, by the processor and based on the aggregated positive and negative weights, information relating to the identity; and

    allowing or denying, by the processor and using the likelihood, along with a hierarchal scheme of registration, access to the user of different systems associated with the account.

View all claims
  • 4 Assignments
Timeline View
Assignment View
    ×
    ×