Behavioral fingerprinting with adaptive development
First Claim
1. A system, comprising:
- circuitry configured for determining at least one indication of utilization for at least one authorized user via at least one user-device interaction;
circuitry configured for incorporating the at least one indication of utilization into at least one behavioral fingerprint associated with the at least one authorized user, the at least one behavioral fingerprint including at least one or more indicators of utilization of one or more user devices by the at least one authorized user;
circuitry configured for determining via at least one user device that at least one user has made a request for performance of at least one task;
circuitry configured for determining at least one degree of authentication associated with identity of the at least one user via the at least one user device at least partially based on the at least one behavioral fingerprint;
circuitry configured for determining at least one level of authorization corresponding to the determined at least one degree of authentication associated with identity of the at least one user; and
circuitry configured for performing the at least one task as a function of the determined at least one level of authorization corresponding to the determined at least one degree of authentication associated with identity of the at least one user.
7 Assignments
0 Petitions
Accused Products
Abstract
Disclosed herein are example embodiments for behavioral fingerprinting with adaptive development. For certain example embodiments, one or more devices may: (i) determine at least one indication of utilization for at least one authorized user via at least one user-device interaction; and (ii) incorporate at least one indication of utilization into at least one behavioral fingerprint that is associated with at least one authorized user, with the at least one behavioral fingerprint including one or more indicators of utilization of one or more user devices by the at least one authorized user. However, claimed subject matter is not limited to any particular described embodiments, implementations, examples, or so forth.
235 Citations
34 Claims
-
1. A system, comprising:
-
circuitry configured for determining at least one indication of utilization for at least one authorized user via at least one user-device interaction; circuitry configured for incorporating the at least one indication of utilization into at least one behavioral fingerprint associated with the at least one authorized user, the at least one behavioral fingerprint including at least one or more indicators of utilization of one or more user devices by the at least one authorized user; circuitry configured for determining via at least one user device that at least one user has made a request for performance of at least one task; circuitry configured for determining at least one degree of authentication associated with identity of the at least one user via the at least one user device at least partially based on the at least one behavioral fingerprint; circuitry configured for determining at least one level of authorization corresponding to the determined at least one degree of authentication associated with identity of the at least one user; and circuitry configured for performing the at least one task as a function of the determined at least one level of authorization corresponding to the determined at least one degree of authentication associated with identity of the at least one user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 29, 30, 31, 32, 33, 34)
-
-
27. A method, comprising:
-
determining at least one indication of utilization for at least one authorized user via at least one user-device interaction; incorporating the at least one indication of utilization into at least one behavioral fingerprint associated with the at least one authorized user, the at least one behavioral fingerprint including at least one or more indicators of utilization of one or more user devices by the at least one authorized user; determining via at least one user device that at least one user has made a request for performance of at least one task; determining at least one degree of authentication associated with identity of the at least one user via the at least one user device at least partially based on the at least one behavioral fingerprint; determining at least one level of authorization corresponding to the determined at least one degree of authentication associated with identity of the at least one user; and performing the at least one task as a function of the determined at least one level of authorization corresponding to the determined at least one degree of authentication associated with identity of the at least one user.
-
-
28. A computer program product, comprising:
at least one non-transitory computer-readable medium including at least; one or more instructions for determining at least one indication of utilization for at least one authorized user via at least one user-device interaction; one or more instructions for incorporating the at least one indication of utilization into at least one behavioral fingerprint associated with the at least one authorized user, the at least one behavioral fingerprint including at least one or more indicators of utilization of one or more user devices by the at least one authorized user; one or more instructions for determining via at least one user device that at least one user has made a request for performance of at least one task; one or more instructions for determining at least one degree of authentication associated with identity of the at least one user via the at least one user device at least partially based on the at least one behavioral fingerprint; one or more instructions for determining at least one level of authorization corresponding to the determined at least one degree of authentication associated with identity of the at least one user; and one or more instructions for performing the at least one task as a function of the determined at least one level of authorization corresponding to the determined at least one degree of authentication associated with identity of the at least one user.
Specification