Trust verification schema based transaction authorization
First Claim
Patent Images
1. A computationally-implemented system, comprising:
- circuitry for determining one or more behavioral fingerprints associated with a network accessible user, the one or more behavioral fingerprints including at least data related to a physical movement of at least part of the system, the data being at least partially used to at least configure a level of authentication of the network accessible user, the data being at least partially based on the physical movement of the at least part of the system after the network accessible user has been authorized to access the system, the data being at least partially used to at least one of establish or change a level of authentication of the network accessible user;
circuitry for relationally mapping the one or more behavioral fingerprints to generate a trust verification schema associated with the network accessible user; and
circuitry for determining whether to authenticate one or more transactions via the trust verification schema.
7 Assignments
0 Petitions
Accused Products
Abstract
A computationally implemented method includes, but is not limited to: for determining one or more behavioral fingerprints associated with one or more network accessible users; relationally mapping the one or more behavioral fingerprints to generate a trust verification schema associated with the one or more network accessible users; and determining whether to authenticate one or more transactions via the trust verification schema. In addition to the foregoing, other method aspects are described in the claims, drawings, and text forming a part of the present disclosure.
-
Citations
28 Claims
-
1. A computationally-implemented system, comprising:
-
circuitry for determining one or more behavioral fingerprints associated with a network accessible user, the one or more behavioral fingerprints including at least data related to a physical movement of at least part of the system, the data being at least partially used to at least configure a level of authentication of the network accessible user, the data being at least partially based on the physical movement of the at least part of the system after the network accessible user has been authorized to access the system, the data being at least partially used to at least one of establish or change a level of authentication of the network accessible user; circuitry for relationally mapping the one or more behavioral fingerprints to generate a trust verification schema associated with the network accessible user; and circuitry for determining whether to authenticate one or more transactions via the trust verification schema. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23)
-
-
24. One or more non-transitory media having one or more executable instructions that, when executed by one or more processing components, perform a process comprising:
-
determining one or more behavioral fingerprints associated with a network accessible user, the one or more behavioral fingerprints including at least data related to a physical movement of at least part of the system, the data being at least partially used to at least configure a level of authentication of the network accessible user, the data being at least partially based on the physical movement of the at least part of the system after the network accessible user has been authorized to access the system, the data being at least partially used to at least configure a level of authentication of the network accessible user; mapping the one or more behavioral fingerprints to generate a trust verification schema associated with the network accessible user; and determining whether to authenticate one or more transactions via the trust verification schema.
-
-
25. A computationally-implemented system comprising:
-
means for determining one or more behavioral fingerprints associated with a network accessible user, the one or more behavioral fingerprints including at least data related to a physical movement of at least part of the system, the data being at least partially used to at least configure a level of authentication of the network accessible user, the data being at least partially based on the physical movement of the at least part of the system after the network accessible user has been authorized to access the system; means for relationally mapping the one or more behavioral fingerprints to generate a trust verification schema associated with the network accessible user; and means for determining whether to authenticate one or more transactions via the trust verification schema. - View Dependent Claims (27, 28)
-
-
26. A computationally-implemented system comprising:
-
means for determining one or more behavioral fingerprints associated with a network accessible user, the one or more behavioral fingerprints including at least data related to a physical movement of at least part of the system, the data being at least partially used to at least configure a level of authentication of the network accessible user, wherein the level of authentication is at least partially based on comparing the data with stored data indicating one or more predetermined movements; means for relationally mapping the one or more behavioral fingerprints to generate a trust verification schema associated with the network accessible user; and means for determining whether to authenticate one or more transactions via the trust verification schema.
-
Specification