发明名称 |
Method of Criminal Profiling and Person Identification Using Cognitive/Behavioral Biometric Fingerprint Analysis |
摘要 |
A method of criminal profiling and person identification that utilizes an online identity software-based solution which focuses on the cognitive/behavioral aspects of an individual who is attempting to gain or has gained unauthorized access to a computer system or portions of that system, who may be posing as an authorized user of that system. There is an emphasis on identifying the intruder's unique cognitive/behavioral biometric fingerprint while he is creating usable electronic evidence during his criminal behavior in cyberspace. |
申请公布号 |
US2015096002(A1) |
申请公布日期 |
2015.04.02 |
申请号 |
US201414121609 |
申请日期 |
2014.09.24 |
申请人 |
Shuart Laird H.;Shuart Marcia L;Jankowski Sharon E;Jankowski Bruce D;Pfannenstiel Thomas R.;Engelhaupt Dustin M |
发明人 |
Shuart Laird H.;Shuart Marcia L;Jankowski Sharon E;Jankowski Bruce D;Pfannenstiel Thomas R.;Engelhaupt Dustin M |
分类号 |
H04L29/06;G06N5/04 |
主分类号 |
H04L29/06 |
代理机构 |
|
代理人 |
|
主权项 |
1. A computer program product comprising at least one non-transitory computer-readable medium tangibly embodying a computer readable program within a computer system having internet and/or intranet connectivity, wherein the computer-readable program when executed: (i) initiates an authorization session and/or otherwise prompts a potential intruder with a cognitive fingerprint screen or page; (ii) that calls for a response that requires specific measurable cognitive/behavioral biometrics; (iii) the text of which includes one or more outside variables; (iv) that comprise one or more unknown shared profiling secrets; (v) receives and records each voluntary measurable response made; (vi) plots the measureable response on a cognitive grid; (vii) analyzes the response taking into consideration its' placement on the grid; (viii) transforms each response that meets or exceeds a specified level of accuracy into an outside credential creating usable electric evidence; (ix) generates data output regarding the outside credential; (x) initiates a prescribed action based on the outside credential, and; (xi) stores data in, and retrieves data from, a target storage area. |
地址 |
Topeka KS US |