System and method for identity consolidation
First Claim
1. A computer-implemented method, comprising:
- receiving, by a processing device executing an identification engine, user identification data extracted from an electronic communication, the user identification data corresponding to an unknown identity of a sender of the electronic communication;
determining, by the processing device, a known identity for the sender using the user identification data extracted from the electronic communication;
associating, by the processing device, the known identity with the unknown identity of the sender of the electronic communication, an association between the known identity and the unknown identity being maintained to determine whether parties of subsequent information transfers are authorized to participate in the information transfers;
determining a measure of correlation strength for the association between the known identity and the unknown identity based on at least one of how often the association is detected and how many times the association has been detected, wherein the correlation strength is maintained with the association; and
transmitting the known identity as the sender of the electronic communication and the measure of correlation strength to a communications data monitoring system to monitor information content to detect policy violation incidents.
3 Assignments
0 Petitions
Accused Products
Abstract
A method and apparatus for identity consolidation for a plurality of electronic identities is described. In one embodiment, the method includes receiving user identification data extracted from an electronic communication, the user identification data corresponding to an unknown identity of a sender of the electronic communication. The method further includes determining a known identity for the sender using the user identification data extracted from the electronic communication and associating the known identity with the unknown identity of the sender of the electronic communication. In one embodiment, an association between the known identity and the unknown identity is maintained to determine whether parties of subsequent information transfers are authorized to participate in the information transfers.
-
Citations
17 Claims
-
1. A computer-implemented method, comprising:
-
receiving, by a processing device executing an identification engine, user identification data extracted from an electronic communication, the user identification data corresponding to an unknown identity of a sender of the electronic communication; determining, by the processing device, a known identity for the sender using the user identification data extracted from the electronic communication; associating, by the processing device, the known identity with the unknown identity of the sender of the electronic communication, an association between the known identity and the unknown identity being maintained to determine whether parties of subsequent information transfers are authorized to participate in the information transfers; determining a measure of correlation strength for the association between the known identity and the unknown identity based on at least one of how often the association is detected and how many times the association has been detected, wherein the correlation strength is maintained with the association; and transmitting the known identity as the sender of the electronic communication and the measure of correlation strength to a communications data monitoring system to monitor information content to detect policy violation incidents. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system comprising:
-
a memory and a processing device coupled to the memory, wherein the processing device is configured to execute an identification data receipt engine and an identification correlation engine; the identification data receipt engine, configured to receive user identification data extracted from an electronic communication, the user identification data corresponding to an unknown identity of a sender of the electronic communication; and the identification correlation engine, configured to; determine a known identity for the sender using the user identification data extracted from the electronic communication; associate the known identity with the unknown identity of the sender of the electronic communication, an association between the known identity and the unknown identity being maintained to determine whether parties of subsequent information transfers are authorized to participate in the information transfers; determine a measure of correlation strength for the association between the known identity and the unknown identity based on at least one of how often the association is detected and how many times the association has been detected, wherein the correlation strength is maintained with the association; and transmit the known identity as the sender of the electronic communication and the measure of correlation strength to a communications data monitoring system to monitor information content to detect policy violation incidents. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory computer readable storage medium that provides instructions, which when executed on a processing device, cause the processing device to perform a method comprising:
-
receiving, by the processing device, user identification data extracted from an electronic communication, the user identification data corresponding to an unknown identity of a sender of the electronic communication; determining, by the processing device, a known identity for the sender using the user identification data extracted from the electronic communication; associating, by the processing device, the known identity with the unknown identity of the sender of the electronic communication, an association between the known identity and the unknown identity being maintained to determine whether parties of subsequent information transfers are authorized to participate in the information transfers; determining a measure of correlation strength for the association between the known identity and the unknown identity based on at least one of how often the association is detected and how many times the association has been detected, wherein the correlation strength is maintained with the association; and transmitting the known identity as the sender of the electronic communication and the measure of correlation strength to a communications data monitoring system to monitor information content to detect policy violation incidents. - View Dependent Claims (16, 17)
-
Specification