发明名称 Method of Criminal Profiling and Person Identification Using Cognitive/Behavioral Biometric Fingerprint Analysis
摘要 A method of criminal profiling and person identification that utilizes an online identity software-based solution which focuses on the cognitive/behavioral aspects of an individual who is attempting to gain or has gained unauthorized access to a computer system or portions of that system, who may be posing as an authorized user of that system. There is an emphasis on identifying the intruder's unique cognitive/behavioral biometric fingerprint while he is creating usable electronic evidence during his criminal behavior in cyberspace.
申请公布号 US2015096002(A1) 申请公布日期 2015.04.02
申请号 US201414121609 申请日期 2014.09.24
申请人 Shuart Laird H.;Shuart Marcia L;Jankowski Sharon E;Jankowski Bruce D;Pfannenstiel Thomas R.;Engelhaupt Dustin M 发明人 Shuart Laird H.;Shuart Marcia L;Jankowski Sharon E;Jankowski Bruce D;Pfannenstiel Thomas R.;Engelhaupt Dustin M
分类号 H04L29/06;G06N5/04 主分类号 H04L29/06
代理机构 代理人
主权项 1. A computer program product comprising at least one non-transitory computer-readable medium tangibly embodying a computer readable program within a computer system having internet and/or intranet connectivity, wherein the computer-readable program when executed: (i) initiates an authorization session and/or otherwise prompts a potential intruder with a cognitive fingerprint screen or page; (ii) that calls for a response that requires specific measurable cognitive/behavioral biometrics; (iii) the text of which includes one or more outside variables; (iv) that comprise one or more unknown shared profiling secrets; (v) receives and records each voluntary measurable response made; (vi) plots the measureable response on a cognitive grid; (vii) analyzes the response taking into consideration its' placement on the grid; (viii) transforms each response that meets or exceeds a specified level of accuracy into an outside credential creating usable electric evidence; (ix) generates data output regarding the outside credential; (x) initiates a prescribed action based on the outside credential, and; (xi) stores data in, and retrieves data from, a target storage area.
地址 Topeka KS US