DECEPTIVE INDICIA PROFILE GENERATION FROM COMMUNICATIONS INTERACTIONS
    91.
    发明申请
    DECEPTIVE INDICIA PROFILE GENERATION FROM COMMUNICATIONS INTERACTIONS 有权
    来自通信互动的决定性指标简介

    公开(公告)号:US20130139258A1

    公开(公告)日:2013-05-30

    申请号:US13562689

    申请日:2012-07-31

    Abstract: Systems, methods, computer-readable storage mediums including computer-readable instructions and/or circuitry for generating deceptive indicia profiles may implement operations including, but not limited to: detecting one or more indicia of deception associated with one or more signals associated with communication content provided by a participant in a first communications interaction; detecting one or more indicia of deception associated with one or more signals associated with communications content provided by the participant in a second communications interaction; generating a deceptive indicia profile for the participant according to indicia of deception detected in the communications content provided by the participant in the first communications interaction and indicia of deception detected in the communications content provided by the participant in the second communications interaction; and providing a notification associated with the deceptive indicia profile for the participant to a second participant in a communications interaction with the participant.

    Abstract translation: 包括计算机可读指令和/或用于产生欺骗性标记简档的电路的系统,方法,计算机可读存储介质可以实现操作,包括但不限于:检测与通信内容相关联的一个或多个信号相关联的一个或多个欺骗标记 由参与者提供的第一通信交互; 在第二通信交互中检测与参与者提供的与通信内容相关联的一个或多个信号相关联的一个或多个欺骗标记; 根据参与者在第二通信交互中提供的通信内容中检测到的第一通信交互和欺骗标记中提供的通信内容中检测到的欺骗标记,生成参与者的欺骗性标记简档; 以及在与所述参与者的通信交互中向所述参与者提供与所述参与者的所述欺骗性标记简档相关联的通知给第二参与者。

    Relationship Based Trust Verification Schema
    93.
    发明申请
    Relationship Based Trust Verification Schema 审中-公开
    基于关系的信任验证模式

    公开(公告)号:US20130133054A1

    公开(公告)日:2013-05-23

    申请号:US13552502

    申请日:2012-07-18

    CPC classification number: G06F21/316

    Abstract: A computationally-implemented method, in accordance with certain example embodiments, may include, but is not limited to: receiving at a computer device one or more behavioral fingerprints associated with one or more network accessible users; receiving an authentication request at the computer device, the authentication request associated with one or more proposed transactions of the one or more network accessible users; and transmitting from the computer device a decision associated with the authentication request, the decision based at least partially on a trust verification schema generated from a relational mapping of the one or more behavioral fingerprints associated with the one or more network accessible users. In addition to the foregoing, other aspects are presented in the claims, drawings, and written description forming a part of the present disclosure.

    Abstract translation: 根据某些示例实施例的计算实现的方法可以包括但不限于:在计算机设备处接收与一个或多个网络可访问用户相关联的一个或多个行为指纹; 在所述计算机设备处接收认证请求,所述认证请求与所述一个或多个网络可访问用户的一个或多个所提议的事务相关联; 以及从所述计算机设备发送与所述认证请求相关联的决定,所述决定至少部分地基于从与所述一个或多个网络可访问用户相关联的所述一个或多个行为指纹的关系映射生成的信任验证模式。 除了上述之外,其他方面在形成本公开的一部分的权利要求书,附图和书面描述中给出。

Patent Agency Ranking