User behavior profile in a blockchain
First Claim
Patent Images
1. A computer-implementable method for generating a cyber behavior profile, comprising:
- monitoring user interactions between a user and an information handling system;
converting the user interactions and the information about the user into electronic information representing the user interactions, the electronic information representing the user interactions comprising respective user behavior elements;
generating a unique cyber behavior profile based upon the electronic information representing the user interactions and the information about the user;
storing information relating to the unique cyber behavior profile in a behavior blockchain;
storing the respective user behavior elements in user behavior blocks of the behavior blockchain;
determining whether a user behavior element is suspect;
appending the user behavior element to the behavior blockchain as a known good user behavior element when the user behavior element is not suspect; and
,appending the user behavior element to the behavior blockchain as a suspect cyber behavior element when the user behavior element is suspect.
8 Assignments
0 Petitions
Accused Products
Abstract
A method, system and computer-usable medium are disclosed for generating a cyber behavior profile, comprising: monitoring user interactions between a user and an information handling system; converting the user interactions and the information about the user into electronic information representing the user interactions; generating a unique cyber behavior profile based upon the electronic information representing the user interactions and the information about the user; and, storing information relating to the unique cyber behavior profile in a behavior blockchain.
116 Citations
17 Claims
-
1. A computer-implementable method for generating a cyber behavior profile, comprising:
-
monitoring user interactions between a user and an information handling system; converting the user interactions and the information about the user into electronic information representing the user interactions, the electronic information representing the user interactions comprising respective user behavior elements; generating a unique cyber behavior profile based upon the electronic information representing the user interactions and the information about the user; storing information relating to the unique cyber behavior profile in a behavior blockchain; storing the respective user behavior elements in user behavior blocks of the behavior blockchain; determining whether a user behavior element is suspect; appending the user behavior element to the behavior blockchain as a known good user behavior element when the user behavior element is not suspect; and
,appending the user behavior element to the behavior blockchain as a suspect cyber behavior element when the user behavior element is suspect. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A system comprising:
-
a processor; a data bus coupled to the processor; and a non-transitory, computer-readable storage medium embodying computer program code, the non-transitory, computer-readable storage medium being coupled to the data bus, the computer program code interacting with a plurality of computer operations and comprising instructions executable by the processor and configured for; monitoring user interactions between a user and an information handling system; converting the user interactions and the information about the user into electronic information representing the user interactions, the electronic information representing the user interactions comprising respective user behavior elements; generating a unique cyber behavior profile based upon the electronic information representing the user interactions and the information about the user; and storing information relating to the unique cyber behavior profile in a behavior blockchain; storing the respective user behavior elements in user behavior blocks of the behavior blockchain; determining whether a user behavior element is suspect; appending the user behavior element to the behavior blockchain as a known good user behavior element when the user behavior element is not suspect; and
,appending the user behavior element to the behavior blockchain as a suspect cyber behavior element when the user behavior element is suspect. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A non-transitory, computer-readable storage medium embodying computer program code, the computer program code comprising computer executable instructions configured for:
-
monitoring user interactions between a user and an information handling system; converting the user interactions and the information about the user into electronic information representing the user interactions; generating a unique cyber behavior profile based upon the electronic information representing the user interactions and the information about the user; and
,storing information relating to the unique cyber behavior profile in a behavior blockchain; storing the respective user behavior elements in user behavior blocks of the behavior blockchain; determining whether a user behavior element is suspect; appending the user behavior element to the behavior blockchain as a known good user behavior element when the user behavior element is not suspect; and
,appending the user behavior element to the behavior blockchain as a suspect cyber behavior element when the user behavior element is suspect. - View Dependent Claims (12, 13, 14, 15, 16, 17)
-
Specification