Multi-factor profile and security fingerprint analysis

A security fingerprint architecture is disclosed. A security fingerprint comprises one or more behavioral factors which store a history of events associated with one or more users. The data in the security fingerprint is exposed by one or more modes, each of which determines the conditions that data...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: SCHULER SETH H, SUBRAMANIAN BALA, GOO MICHAEL J, ZHAO LINDA, KONG XIANGLONG, KSHIRSAGAR VINAY, GIARD JEFFREY M, SANDIDGE TONY A
Format: Patent
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator SCHULER SETH H
SUBRAMANIAN BALA
GOO MICHAEL J
ZHAO LINDA
KONG XIANGLONG
KSHIRSAGAR VINAY
GIARD JEFFREY M
SANDIDGE TONY A
description A security fingerprint architecture is disclosed. A security fingerprint comprises one or more behavioral factors which store a history of events associated with one or more users. The data in the security fingerprint is exposed by one or more modes, each of which determines the conditions that data in the security fingerprint may be accessed. Security fingerprints support a number of primitive operations that allow set operations to be performed. Security fingerprints may be used in for authentication, advertising, and other operations either alone, or in conjunction with third party data sources. An exemplary platform of security fingerprints built upon a cellular infrastructure is also disclosed.
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_CN104704521A</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>CN104704521A</sourcerecordid><originalsourceid>FETCH-epo_espacenet_CN104704521A3</originalsourceid><addsrcrecordid>eNrjZDDzLc0pydRNS0wuyS9SKCjKT8vMSVVIzEtRKE5NLi3KLKlUSMvMS08tKijKzCsBSiTmVBZnFvMwsKYl5hSn8kJpbgZFN9cQZw_d1IL8-NTigsTk1LzUknhnP0MDE3MDE1MjQ0djYtQAANV2Lgw</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Multi-factor profile and security fingerprint analysis</title><source>esp@cenet</source><creator>SCHULER SETH H ; SUBRAMANIAN BALA ; GOO MICHAEL J ; ZHAO LINDA ; KONG XIANGLONG ; KSHIRSAGAR VINAY ; GIARD JEFFREY M ; SANDIDGE TONY A</creator><creatorcontrib>SCHULER SETH H ; SUBRAMANIAN BALA ; GOO MICHAEL J ; ZHAO LINDA ; KONG XIANGLONG ; KSHIRSAGAR VINAY ; GIARD JEFFREY M ; SANDIDGE TONY A</creatorcontrib><description>A security fingerprint architecture is disclosed. A security fingerprint comprises one or more behavioral factors which store a history of events associated with one or more users. The data in the security fingerprint is exposed by one or more modes, each of which determines the conditions that data in the security fingerprint may be accessed. Security fingerprints support a number of primitive operations that allow set operations to be performed. Security fingerprints may be used in for authentication, advertising, and other operations either alone, or in conjunction with third party data sources. An exemplary platform of security fingerprints built upon a cellular infrastructure is also disclosed.</description><language>eng</language><subject>CALCULATING ; COMPUTING ; COUNTING ; DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FORADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORYOR FORECASTING PURPOSES ; ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRICITY ; HANDLING RECORD CARRIERS ; PHYSICS ; PRESENTATION OF DATA ; RECOGNITION OF DATA ; RECORD CARRIERS ; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE,COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTINGPURPOSES, NOT OTHERWISE PROVIDED FOR ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION ; WIRELESS COMMUNICATIONS NETWORKS</subject><creationdate>2015</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20150610&amp;DB=EPODOC&amp;CC=CN&amp;NR=104704521A$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,776,881,25542,76516</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20150610&amp;DB=EPODOC&amp;CC=CN&amp;NR=104704521A$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>SCHULER SETH H</creatorcontrib><creatorcontrib>SUBRAMANIAN BALA</creatorcontrib><creatorcontrib>GOO MICHAEL J</creatorcontrib><creatorcontrib>ZHAO LINDA</creatorcontrib><creatorcontrib>KONG XIANGLONG</creatorcontrib><creatorcontrib>KSHIRSAGAR VINAY</creatorcontrib><creatorcontrib>GIARD JEFFREY M</creatorcontrib><creatorcontrib>SANDIDGE TONY A</creatorcontrib><title>Multi-factor profile and security fingerprint analysis</title><description>A security fingerprint architecture is disclosed. A security fingerprint comprises one or more behavioral factors which store a history of events associated with one or more users. The data in the security fingerprint is exposed by one or more modes, each of which determines the conditions that data in the security fingerprint may be accessed. Security fingerprints support a number of primitive operations that allow set operations to be performed. Security fingerprints may be used in for authentication, advertising, and other operations either alone, or in conjunction with third party data sources. An exemplary platform of security fingerprints built upon a cellular infrastructure is also disclosed.</description><subject>CALCULATING</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FORADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORYOR FORECASTING PURPOSES</subject><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRICITY</subject><subject>HANDLING RECORD CARRIERS</subject><subject>PHYSICS</subject><subject>PRESENTATION OF DATA</subject><subject>RECOGNITION OF DATA</subject><subject>RECORD CARRIERS</subject><subject>SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE,COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTINGPURPOSES, NOT OTHERWISE PROVIDED FOR</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><subject>WIRELESS COMMUNICATIONS NETWORKS</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2015</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZDDzLc0pydRNS0wuyS9SKCjKT8vMSVVIzEtRKE5NLi3KLKlUSMvMS08tKijKzCsBSiTmVBZnFvMwsKYl5hSn8kJpbgZFN9cQZw_d1IL8-NTigsTk1LzUknhnP0MDE3MDE1MjQ0djYtQAANV2Lgw</recordid><startdate>20150610</startdate><enddate>20150610</enddate><creator>SCHULER SETH H</creator><creator>SUBRAMANIAN BALA</creator><creator>GOO MICHAEL J</creator><creator>ZHAO LINDA</creator><creator>KONG XIANGLONG</creator><creator>KSHIRSAGAR VINAY</creator><creator>GIARD JEFFREY M</creator><creator>SANDIDGE TONY A</creator><scope>EVB</scope></search><sort><creationdate>20150610</creationdate><title>Multi-factor profile and security fingerprint analysis</title><author>SCHULER SETH H ; SUBRAMANIAN BALA ; GOO MICHAEL J ; ZHAO LINDA ; KONG XIANGLONG ; KSHIRSAGAR VINAY ; GIARD JEFFREY M ; SANDIDGE TONY A</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_CN104704521A3</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2015</creationdate><topic>CALCULATING</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FORADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORYOR FORECASTING PURPOSES</topic><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRICITY</topic><topic>HANDLING RECORD CARRIERS</topic><topic>PHYSICS</topic><topic>PRESENTATION OF DATA</topic><topic>RECOGNITION OF DATA</topic><topic>RECORD CARRIERS</topic><topic>SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE,COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTINGPURPOSES, NOT OTHERWISE PROVIDED FOR</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><topic>WIRELESS COMMUNICATIONS NETWORKS</topic><toplevel>online_resources</toplevel><creatorcontrib>SCHULER SETH H</creatorcontrib><creatorcontrib>SUBRAMANIAN BALA</creatorcontrib><creatorcontrib>GOO MICHAEL J</creatorcontrib><creatorcontrib>ZHAO LINDA</creatorcontrib><creatorcontrib>KONG XIANGLONG</creatorcontrib><creatorcontrib>KSHIRSAGAR VINAY</creatorcontrib><creatorcontrib>GIARD JEFFREY M</creatorcontrib><creatorcontrib>SANDIDGE TONY A</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>SCHULER SETH H</au><au>SUBRAMANIAN BALA</au><au>GOO MICHAEL J</au><au>ZHAO LINDA</au><au>KONG XIANGLONG</au><au>KSHIRSAGAR VINAY</au><au>GIARD JEFFREY M</au><au>SANDIDGE TONY A</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Multi-factor profile and security fingerprint analysis</title><date>2015-06-10</date><risdate>2015</risdate><abstract>A security fingerprint architecture is disclosed. A security fingerprint comprises one or more behavioral factors which store a history of events associated with one or more users. The data in the security fingerprint is exposed by one or more modes, each of which determines the conditions that data in the security fingerprint may be accessed. Security fingerprints support a number of primitive operations that allow set operations to be performed. Security fingerprints may be used in for authentication, advertising, and other operations either alone, or in conjunction with third party data sources. An exemplary platform of security fingerprints built upon a cellular infrastructure is also disclosed.</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language eng
recordid cdi_epo_espacenet_CN104704521A
source esp@cenet
subjects CALCULATING
COMPUTING
COUNTING
DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FORADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORYOR FORECASTING PURPOSES
ELECTRIC COMMUNICATION TECHNIQUE
ELECTRICITY
HANDLING RECORD CARRIERS
PHYSICS
PRESENTATION OF DATA
RECOGNITION OF DATA
RECORD CARRIERS
SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE,COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTINGPURPOSES, NOT OTHERWISE PROVIDED FOR
TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION
WIRELESS COMMUNICATIONS NETWORKS
title Multi-factor profile and security fingerprint analysis
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-15T22%3A47%3A00IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=SCHULER%20SETH%20H&rft.date=2015-06-10&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3ECN104704521A%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true