Network acquired behavioral fingerprint for authentication
First Claim
Patent Images
1. A computationally-implemented system, comprising:
- (A) circuitry for identifying a network connection coupling a computer server to a computing device; and
(B) circuitry for transmitting, via the network connection, at least a portion of a behavioral fingerprint associated with an authorized user of the computing device, at least a portion of the behavioral fingerprint providing at least one status of the authorized user with respect to the computing device, including at least;
(1) circuitry for regenerating at least a portion of the behavioral fingerprint associated with the authorized user based at least partially on a reconstructed key that is at least partially formed via data gathered from at least one social network, including at least;
(a) circuitry for generating a security certificate associated with the authorized user based at least partially on at least one cryptographic key; and
(b) circuitry for producing one or more derivations of the at least one cryptographic key to enable distribution of the one or more derivations of the at least one cryptographic key to enable reconstruction of the at least one cryptographic key via the data gathered from the at least one social network.
7 Assignments
0 Petitions
Accused Products
Abstract
A computationally-implemented method, for certain example embodiments, may include, but is not limited to: identifying a network connection coupling a computer server to a computing device; and transmitting, via the network connection, a behavioral fingerprint associated with an authorized user of the computing device, the behavioral fingerprint providing at least one status of the authorized user with respect to the computing device. In addition to the foregoing, other example aspects are presented in the claims, drawings, and written description forming a part of the present disclosure.
146 Citations
53 Claims
-
1. A computationally-implemented system, comprising:
-
(A) circuitry for identifying a network connection coupling a computer server to a computing device; and (B) circuitry for transmitting, via the network connection, at least a portion of a behavioral fingerprint associated with an authorized user of the computing device, at least a portion of the behavioral fingerprint providing at least one status of the authorized user with respect to the computing device, including at least; (1) circuitry for regenerating at least a portion of the behavioral fingerprint associated with the authorized user based at least partially on a reconstructed key that is at least partially formed via data gathered from at least one social network, including at least; (a) circuitry for generating a security certificate associated with the authorized user based at least partially on at least one cryptographic key; and (b) circuitry for producing one or more derivations of the at least one cryptographic key to enable distribution of the one or more derivations of the at least one cryptographic key to enable reconstruction of the at least one cryptographic key via the data gathered from the at least one social network. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51)
-
-
52. A computationally-implemented system, comprising:
-
(A) means for identifying a network connection coupling a computer server to a computing device; and (B) means for transmitting, via the network connection, at least a portion of a behavioral fingerprint associated with an authorized user of the computing device, at least a portion of the behavioral fingerprint providing at least one status of the authorized user with respect to the computing device, including at least; (1) means for regenerating at least a portion of the behavioral fingerprint associated with the authorized user based at least partially on a reconstructed key that is at least partially formed via data gathered from at least one social network, including at least; (a) means for generating a security certificate associated with the authorized user based at least partially on at least one cryptographic key; and (b) means for producing one or more derivations of the at least one cryptographic key to enable distribution of the one or more derivations of the at least one cryptographic key to enable reconstruction of the at least one cryptographic key via the data gathered from the at least one social network.
-
-
53. A computationally-implemented method, comprising:
-
(A) identifying a network connection coupling a computer server to a computing device; and (B) transmitting, via the network connection, at least a portion of a behavioral fingerprint associated with an authorized user of the computing device, at least a portion of the behavioral fingerprint providing at least one status of the authorized user with respect to the computing device, including at least; (1) regenerating at least a portion of the behavioral fingerprint associated with the authorized user based at least partially on a reconstructed key that is at least partially formed via data gathered from at least one social network, including at least; (a) generating a security certificate associated with the authorized user based at least partially on at least one cryptographic key; and (b) producing one or more derivations of the at least one cryptographic key to enable distribution of the one or more derivations of the at least one cryptographic key to enable reconstruction of the at least one cryptographic key via the data gathered from the at least one social network.
-
Specification