Behavioral fingerprint controlled automatic task determination
First Claim
Patent Images
1. A system, comprising:
- at least one hardware computing device; and
one or more instructions which when executed on the at least one hardware computing device cause the at least one hardware computing device to at least;
maintain at least one behavioral fingerprint, the at least one behavioral fingerprint associated with the at least one hardware computing device and at least one authorized user of the at least one hardware computing device;
detect, at least partially based on at least one comparative analysis, at least one indication that the at least one hardware computing device is not under control of the at least one authorized user, the at least one comparative analysis including at least comparing at least a portion of at least one image associated with the at least one behavioral fingerprint to at least a portion of at least one image captured by at least one image sensor of the at least one hardware computing device;
control at least one security-related aspect of the at least one hardware computing device at least partially based on at least one direction received from the at least one authorized user; and
enable one or more automatic tasks, including at least transmitting one or more alerts indicative of one or more of the at least one authorized user or the at least one hardware computing device.
7 Assignments
0 Petitions
Accused Products
Abstract
A computationally implemented method includes, but is not limited to: determining a behavioral fingerprint associated with a network-accessible user, the behavioral fingerprint providing a current status of the network-accessible user; and controlling one or more devices automatically as a function of the determined behavioral fingerprint and a direction received from the network-accessible user. In addition to the foregoing, other method aspects are described in the claims, drawings, and text forming a part of the present disclosure.
193 Citations
36 Claims
-
1. A system, comprising:
-
at least one hardware computing device; and one or more instructions which when executed on the at least one hardware computing device cause the at least one hardware computing device to at least; maintain at least one behavioral fingerprint, the at least one behavioral fingerprint associated with the at least one hardware computing device and at least one authorized user of the at least one hardware computing device; detect, at least partially based on at least one comparative analysis, at least one indication that the at least one hardware computing device is not under control of the at least one authorized user, the at least one comparative analysis including at least comparing at least a portion of at least one image associated with the at least one behavioral fingerprint to at least a portion of at least one image captured by at least one image sensor of the at least one hardware computing device; control at least one security-related aspect of the at least one hardware computing device at least partially based on at least one direction received from the at least one authorized user; and enable one or more automatic tasks, including at least transmitting one or more alerts indicative of one or more of the at least one authorized user or the at least one hardware computing device. - View Dependent Claims (21, 22)
-
-
2. A system, comprising:
-
circuitry for maintaining at least one behavioral fingerprint, the at least one behavioral fingerprint associated with at least one computing device and at least one authorized user of the at least one computing device; circuitry for detecting, at least partially based on at least one comparative analysis, at least one indication that the at least one computing device is not under control of the at least one authorized user, the at least one comparative analysis including at least comparing at least a portion of at least one image associated with the at least one behavioral fingerprint to at least a portion of at least one image captured by at least one image sensor of the at least one computing device; circuitry for controlling at least one security-related aspect of the at least one computing device at least partially based on at least one direction received from the at least one authorized user; and circuitry for enabling one or more automatic tasks, including at least transmitting one or more alerts indicative of one or more of the at least one authorized user or the at least one computing device. - View Dependent Claims (3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 15, 16, 17, 18, 19, 20, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36)
-
-
14. A method, comprising:
-
maintaining at least one behavioral fingerprint, the at least one behavioral fingerprint associated with at least one computing device and at least one authorized user of the at least one computing device; detecting, at least partially based on at least one comparative analysis, at least one indication that the at least one computing device is not under control of the at least one authorized user, the at least one comparative analysis including at least comparing at least a portion of at least one image associated with the at least one behavioral fingerprint to at least a portion of at least one image captured by at least one image sensor of the at least one computing device; controlling at least one security-related aspect of the at least one computing device at least partially based on at least one direction received from the at least one authorized user; and enabling one or more automatic tasks, including at least transmitting one or more alerts indicative of one or more of the at least one authorized user or the at least one computing device.
-
Specification