Behavioral fingerprint controlled theft detection and recovery
First Claim
Patent Images
1. A computationally-implemented system, comprising:
- circuitry for determining a behavioral fingerprint associated with a network accessible user of one or more devices, the behavioral fingerprint providing a level of authentication of the network accessible user; and
circuitry for disabling at least a portion of the one or more devices automatically as a function of the determined behavioral fingerprint, including at least circuitry for re-enabling at least a portion of the one or more devices as a function of a reconstructed behavioral fingerprint of the network accessible user at least partially via a reconstructed key formed at least partially via gathered data from at least one social network.
8 Assignments
0 Petitions
Accused Products
Abstract
A computationally implemented method includes, but is not limited to: determining a behavioral fingerprint associated with a network accessible user of one or more devices, the behavioral fingerprint providing a current status of the network accessible user; and disabling the one or more devices automatically as a function of the determined behavioral fingerprint. In addition to the foregoing, other method aspects are described in the claims, drawings, and text forming a part of the present disclosure.
-
Citations
34 Claims
-
1. A computationally-implemented system, comprising:
-
circuitry for determining a behavioral fingerprint associated with a network accessible user of one or more devices, the behavioral fingerprint providing a level of authentication of the network accessible user; and circuitry for disabling at least a portion of the one or more devices automatically as a function of the determined behavioral fingerprint, including at least circuitry for re-enabling at least a portion of the one or more devices as a function of a reconstructed behavioral fingerprint of the network accessible user at least partially via a reconstructed key formed at least partially via gathered data from at least one social network. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32)
-
-
33. A computationally-implemented system, comprising:
-
means for determining a behavioral fingerprint associated with a network accessible user of one or more devices, the behavioral fingerprint providing a level of authentication of the network accessible user; and means for disabling at least a portion of the one or more devices automatically as a function of the determined behavioral fingerprint, including at least means for re-enabling at least a portion of the one or more devices as a function of a reconstructed behavioral fingerprint of the network accessible user at least partially via a reconstructed key formed at least partially via gathered data from at least one social network.
-
-
34. A computer program product, comprising:
at least one non-transitory computer readable medium including at least; one or more instructions for determining a behavioral fingerprint associated with a network accessible user of one or more devices, the behavioral fingerprint providing a level of authentication of the network accessible user; and one or more instructions for disabling at least a portion of the one or more devices automatically as a function of the determined behavioral fingerprint, said one or more instructions for disabling including at least one or more instructions for re-enabling at least a portion of the one or more devices as a function of a reconstructed behavioral fingerprint of the network accessible user at least partially via a reconstructed key formed at least partially via gathered data from at least one social network.
Specification