Targeted Patent:

Patent: US8850535B2
Filed: 2011-08-05
Issued: 2014-09-30
Patent Holder: (Original Assignee) Safefaces LLC     (Current Assignee) Street Spirit Ip LLC
Inventor(s): Jason J. Liberman, David Scott Trandal

Title: Methods and systems for identity verification in a social network using ratings

 
Cross Reference / Shared Meaning between the Lines
Charted Against:

Patent: US7974446B2
Filed: 2006-06-29
Issued: 2011-07-05
Patent Holder: (Original Assignee) Konica Minolta Inc     (Current Assignee) Konica Minolta Inc
Inventor(s): Koji Fujiwara

Title: Face authentication system and face authentication method

[FEATURE ID: 1] method, member restrictions, networksystem, computer, server, device, unit, means, section[FEATURE ID: 1] face authentication system, data input section, processor, quality rater, threshold value
[FEATURE ID: 2] management, member account profiles, identification components, services, authentication, combinations, factors, content, member interactions, member identity ratings thresholdsinformation, features, identification, registration, verification, attributes, data[FEATURE ID: 2] registration process, verification process, authentication data
[FEATURE ID: 3] social network systemhuman, subject, person[FEATURE ID: 3] living body
[TRANSITIVE ID: 4] comprising, using, includingcontaining, having, providing, involving, of, incorporating, being[TRANSITIVE ID: 4] comprising, concerning, performing, including
[TRANSITIVE ID: 5] creating, determining, authenticatingreceiving, registering, recording, storing, identifying, providing, establishing[TRANSITIVE ID: 5] obtaining, deriving
[TRANSITIVE ID: 6] identifyingrespective, each, corresponding[TRANSITIVE ID: 6] respect
[TRANSITIVE ID: 7] generatingdetermining, scoring, defining, obtaining, assessing[TRANSITIVE ID: 7] rating
[FEATURE ID: 8] identity ratingexpression, index, image, edge, interval, entirety, accuracy[FEATURE ID: 8] criterion, axis direction, area
[FEATURE ID: 9] member, confirmation, location, agentuser, person, authentication, login, object, registration, certification[FEATURE ID: 9] subject, multiple points
[FEATURE ID: 10] initial rating factorselements, values, characteristics, features, data, measurements[FEATURE ID: 10] points
[FEATURE ID: 11] numbersize, quantity, distribution, reliability, strength, range, region[FEATURE ID: 11] quality, number, localization degree, ratio
[FEATURE ID: 12] qualitysequence, the, use[FEATURE ID: 12] terms
[FEATURE ID: 13] presencequality, trustworthiness, confidence, reliability, time, result[FEATURE ID: 13] reliability value
[FEATURE ID: 14] person authentication, deviceperson, profile, presence, member, face[FEATURE ID: 14] face area
[FEATURE ID: 15] member identity rating, identity ratingsinformation, score, value, status, profile, metadata, evaluation[FEATURE ID: 15] quality data, result
[FEATURE ID: 16] claimembodiment, claims, the claim, paragraph, item, figure, requirement[FEATURE ID: 16] claim
1 . A method [FEATURE ID: 1]

of providing identity verification and management [FEATURE ID: 2]

for a social network system [FEATURE ID: 3]

, the method comprising [TRANSITIVE ID: 4]

: creating [TRANSITIVE ID: 5]

member account profiles [FEATURE ID: 2]

for members of the social network system using [TRANSITIVE ID: 4]

identification components [FEATURE ID: 2]

for identifying [TRANSITIVE ID: 6]

members ; generating [TRANSITIVE ID: 7]

an identity rating [FEATURE ID: 8]

for each member [FEATURE ID: 9]

using initial rating factors [FEATURE ID: 10]

including [TRANSITIVE ID: 4]

: number [FEATURE ID: 11]

of identification components , quality [FEATURE ID: 12]

of identification components , and presence [FEATURE ID: 13]

of an in - person authentication [FEATURE ID: 14]

; determining [TRANSITIVE ID: 5]

member identity rating thresholds for identity rating - restricted services [FEATURE ID: 2]

; authenticating [TRANSITIVE ID: 5]

a member attempting to access one or more identity rating - restricted services over the social network system , wherein the authentication [FEATURE ID: 2]

includes confirmation [FEATURE ID: 9]

of a member - registered device [FEATURE ID: 14]

, confirmation of a member - registered location [FEATURE ID: 9]

, confirmation of a member - registered biometric , and combinations [FEATURE ID: 2]

thereof ; managing the member ' s identity rating in real - time , wherein the member ' s identity rating is altered in real - time by monitoring member identity rating [FEATURE ID: 15]

- altering factors [FEATURE ID: 2]

including keystroke patterns and language analysis ; providing member - to - member restrictions [FEATURE ID: 1]

using the managed identity ratings [FEATURE ID: 15]

, wherein access to network [FEATURE ID: 1]

- based content [FEATURE ID: 2]

and member - to - member interactions [FEATURE ID: 2]

is restricted based on member identity ratings thresholds [FEATURE ID: 2]

; and blocking access to the social network system by unauthenticated members . 2 . The method of claim [FEATURE ID: 16]

1 , wherein the creating of member account profiles includes in - person authentication by an authorized agent [FEATURE ID: 9]

1 . A face authentication system [FEATURE ID: 1]

, comprising [TRANSITIVE ID: 4]

: a data input section [FEATURE ID: 1]

for obtaining [TRANSITIVE ID: 5]

three - dimensional data concerning [TRANSITIVE ID: 4]

a face area [FEATURE ID: 14]

of a subject [FEATURE ID: 9]

at multiple points [FEATURE ID: 9]

; and a processor [FEATURE ID: 1]

for performing [TRANSITIVE ID: 4]

a registration process [FEATURE ID: 2]

or a verification process [FEATURE ID: 2]

of authentication data [FEATURE ID: 2]

of the subject based on the three - dimensional data , the processor including [TRANSITIVE ID: 4]

: a quality rater [FEATURE ID: 1]

for rating [TRANSITIVE ID: 7]

a quality [FEATURE ID: 11]

of the three - dimensional data with respect [FEATURE ID: 6]

to a specified number [FEATURE ID: 11]

of points [FEATURE ID: 10]

of the three - dimensional data to generate quality data [FEATURE ID: 15]

; a quality distribution deriving [TRANSITIVE ID: 5]

section for deriving a distribution of the quality with respect to the face area , based on the quality data ; and a judging section for judging whether the registration process or the verification process is to be executed , based on a result [FEATURE ID: 15]

on the quality distribution derived by the quality distribution deriving section , the judging section performing the judgment based on a localization degree [FEATURE ID: 11]

with respect to a part of the face area where the quality of the three - dimensional data is rated to be low , and a ratio [FEATURE ID: 11]

of the part of the face area where the quality of the three - dimensional data is rated to be low relative to the face area . 2 . The face authentication system according to claim [FEATURE ID: 16]

1 , wherein the quality rater rates the quality of the three - dimensional data , using a predetermined threshold value [FEATURE ID: 1]

, and the quality distribution deriving section derives a localization degree with respect to a part of the face area where the quality of the three - dimensional data is rated to be low . 3 . The face authentication system according to claim 1 , wherein the quality rater rates the quality of the three - dimensional data in terms [FEATURE ID: 12]

of a reliability value [FEATURE ID: 13]

, using a predetermined criterion [FEATURE ID: 8]

, and the quality distribution deriving section derives a localization degree with respect to the face area to which the reliability value of the three - dimensional data is set . 4 . The face authentication system according to claim 2 , wherein the quality distribution deriving section derives the localization degree in an axis direction [FEATURE ID: 8]

corresponding to a transverse direction of the face of the subject . 5 . The face authentication system according to claim 2 , wherein the processor includes a rating area specifying section for removing an area [FEATURE ID: 8]

corresponding to a uniquely identifying portion of a living body [FEATURE ID: 3]








Targeted Patent:

Patent: US8850535B2
Filed: 2011-08-05
Issued: 2014-09-30
Patent Holder: (Original Assignee) Safefaces LLC     (Current Assignee) Street Spirit Ip LLC
Inventor(s): Jason J. Liberman, David Scott Trandal

Title: Methods and systems for identity verification in a social network using ratings

 
Cross Reference / Shared Meaning between the Lines
Charted Against:

Patent: US7958362B2
Filed: 2005-10-11
Issued: 2011-06-07
Patent Holder: (Original Assignee) Chang Gung University CGU     (Current Assignee) Chang Gung University CGU
Inventor(s): Jing-Jang Hwang

Title: User authentication based on asymmetric cryptography utilizing RSA with personalized secret

[FEATURE ID: 1] method, providingsystem, network, technique, computer, remote, procedure, device[FEATURE ID: 1] method, key generation process, user site, system site
[FEATURE ID: 2] identity verification, member, confirmation, member identity rating, identity ratings, agentauthentication, certification, identity, user, security, access, information[FEATURE ID: 2] user authentication, asymmetric cryptography, input
[FEATURE ID: 3] managementregistration, security, validation, access, authentication, recognition[FEATURE ID: 3] acceptance, computer system access
[FEATURE ID: 4] social network system, person authentication, member restrictions, network, law enforcement officeserver, member, group, computer, customer, membership, human[FEATURE ID: 4] user, computer system
[TRANSITIVE ID: 5] comprising, using, includingcontaining, having, providing, of, by, performing, includes[TRANSITIVE ID: 5] comprising, authorizing, using, matches
[TRANSITIVE ID: 6] creating, determining, authenticatingidentifying, receiving, registering, collecting, obtaining, accepting, establishing[TRANSITIVE ID: 6] providing
[FEATURE ID: 7] member account profiles, biometric, access, member interactions, member identity ratings thresholdsaccount, authorization, authority, information, identity, entitlement, name[FEATURE ID: 7] access, public key
[FEATURE ID: 8] identification components, initial rating factors, factorsparameters, elements, variables, inputs, features, attributes, criteria[FEATURE ID: 8] odd primes, primes
[TRANSITIVE ID: 9] identifyingauthorized, unique, authenticated[TRANSITIVE ID: 9] valid
[TRANSITIVE ID: 10] generatingadjusting, setting, replacing, change, altering, increasing, correcting[TRANSITIVE ID: 10] changing, updating
[FEATURE ID: 11] identity ratingidentity, authentication, constant, algorithm, image, identifier, variable[FEATURE ID: 11] password, public key unchanged
[FEATURE ID: 12] authenticationconfirmation, determination, decision, validation, certificate, match, response[FEATURE ID: 12] digital signature, result
[FEATURE ID: 13] devicenumber, password, secret, value, signature, message, key[FEATURE ID: 13] key authenticator, new secret
[FEATURE ID: 14] locationmessage, signature, password[FEATURE ID: 14] response process
[FEATURE ID: 15] member 'provider of, user, user of, system of, administrator of, owner of[FEATURE ID: 15] user '
1 . A method [FEATURE ID: 1]

of providing [TRANSITIVE ID: 1]

identity verification [FEATURE ID: 2]

and management [FEATURE ID: 3]

for a social network system [FEATURE ID: 4]

, the method comprising [TRANSITIVE ID: 5]

: creating [TRANSITIVE ID: 6]

member account profiles [FEATURE ID: 7]

for members of the social network system using [TRANSITIVE ID: 5]

identification components [FEATURE ID: 8]

for identifying [TRANSITIVE ID: 9]

members ; generating [TRANSITIVE ID: 10]

an identity rating [FEATURE ID: 11]

for each member [FEATURE ID: 2]

using initial rating factors [FEATURE ID: 8]

including [TRANSITIVE ID: 5]

: number of identification components , quality of identification components , and presence of an in - person authentication [FEATURE ID: 4]

; determining [TRANSITIVE ID: 6]

member identity rating thresholds for identity rating - restricted services ; authenticating [TRANSITIVE ID: 6]

a member attempting to access one or more identity rating - restricted services over the social network system , wherein the authentication [FEATURE ID: 12]

includes confirmation [FEATURE ID: 2]

of a member - registered device [FEATURE ID: 13]

, confirmation of a member - registered location [FEATURE ID: 14]

, confirmation of a member - registered biometric [FEATURE ID: 7]

, and combinations thereof ; managing the member ' [FEATURE ID: 15]

s identity rating in real - time , wherein the member ' s identity rating is altered in real - time by monitoring member identity rating [FEATURE ID: 2]

- altering factors [FEATURE ID: 8]

including keystroke patterns and language analysis ; providing member - to - member restrictions [FEATURE ID: 4]

using the managed identity ratings [FEATURE ID: 2]

, wherein access [FEATURE ID: 7]

to network [FEATURE ID: 4]

- based content and member - to - member interactions [FEATURE ID: 7]

is restricted based on member identity ratings thresholds [FEATURE ID: 7]

; and blocking access to the social network system by unauthenticated members . 2 . The method of claim 1 , wherein the creating of member account profiles includes in - person authentication by an authorized agent [FEATURE ID: 2]

. 3 . The method of claim 1 , wherein the authorized agent is a law enforcement office [FEATURE ID: 4]

1 . A method [FEATURE ID: 1]

for user authentication [FEATURE ID: 2]

based on asymmetric cryptography [FEATURE ID: 2]

, comprising [TRANSITIVE ID: 5]

: providing [TRANSITIVE ID: 6]

a first input and a second input from a user [FEATURE ID: 4]

who requests an access [FEATURE ID: 7]

to a computer system [FEATURE ID: 4]

; authorizing [TRANSITIVE ID: 5]

the access by using [TRANSITIVE ID: 5]

a challenge and response process [FEATURE ID: 14]

when the first input matches [TRANSITIVE ID: 5]

a personalized secret and the second input matches a crypto - key authenticator [FEATURE ID: 13]

comprising a public modulus , a public exponent , and a private - key - dependent exponent ; changing [TRANSITIVE ID: 10]

the personalized secret to a new secret [FEATURE ID: 13]

and updating [TRANSITIVE ID: 10]

the private - key - dependent exponent while keeping the public modulus and the public exponent unchanged ; using the personalized secret and two odd primes [FEATURE ID: 8]

in a crypto - key generation process [FEATURE ID: 1]

to produce the public modulus , public exponent , and private - key - dependent exponent ; and registering said user ' [FEATURE ID: 15]

s public key [FEATURE ID: 7]

comprising said public modulus and said public exponent with said computer system , acceptance [FEATURE ID: 3]

of which signifies an agreement between said user and said computer system in resolving dispute ; wherein the personalized secret comprises a user - chosen password [FEATURE ID: 11]

, and the challenge and response process comprises using the first and second inputs to produce a digital signature [FEATURE ID: 12]

in response to a challenge from the computer system by verifying the digital signature on both a user site [FEATURE ID: 1]

and a system site [FEATURE ID: 1]

. 2 . A method for user authentication based on asymmetric cryptography comprising : receiving an input [FEATURE ID: 2]

as a password when requesting a computer system access [FEATURE ID: 3]

; using the input in producing a digital signature ; using a public key in validating the digital signature , said public key being registered with said computer system , acceptance of which signifies an agreement between said user and said computer system in resolving dispute ; changing the password while keeping the public key unchanged [FEATURE ID: 11]

; using the password and two primes [FEATURE ID: 8]

in a crypto - key generation process to produce the public key and a private - key - dependent exponent ; using the input and the private - key - dependent exponent in producing the digital signature ; and deciding that the input matches the password if the digital signature is validated as being valid [FEATURE ID: 9]

and , as a result [FEATURE ID: 12]








Targeted Patent:

Patent: US8850535B2
Filed: 2011-08-05
Issued: 2014-09-30
Patent Holder: (Original Assignee) Safefaces LLC     (Current Assignee) Street Spirit Ip LLC
Inventor(s): Jason J. Liberman, David Scott Trandal

Title: Methods and systems for identity verification in a social network using ratings

 
Cross Reference / Shared Meaning between the Lines
Charted Against:

Patent: US7945776B1
Filed: 2006-09-29
Issued: 2011-05-17
Patent Holder: (Original Assignee) EMC Corp     (Current Assignee) EMC Corp
Inventor(s): Yedidia Atzmony, Arnold E. Adelman, Adel M. Hanna

Title: Securing a passphrase

[FEATURE ID: 1] method, biometric, networkcomputer, system, website, program, medium, processor, platform[FEATURE ID: 1] method, target system, storage device, smartcard, algorithm SHA, instructions, device
[TRANSITIVE ID: 2] providing, generating, determining, authenticatingestablishing, monitoring, performing, receiving, identifying, obtaining, managing[TRANSITIVE ID: 2] restricting
[FEATURE ID: 3] identity verification, management, members, quality, presence, member identity rating thresholds, services, confirmation, member identity rating, factors, language analysis, member restrictions, access, content, member interactions, member identity ratings thresholdsauthorization, information, authentication, usage, membership, permission, availability[FEATURE ID: 3] access, access credentials, validity
[FEATURE ID: 4] social network systemcomputer, program, component, device, method, server, controller[FEATURE ID: 4] user, non-transitory computer readable medium, processor, processing
[TRANSITIVE ID: 5] comprising, includinghaving, by, containing, and, of, with, involving[TRANSITIVE ID: 5] comprising, using
[TRANSITIVE ID: 6] creatingstoring, determining, providing, identifying, verifying, collecting, establishing[TRANSITIVE ID: 6] receiving, obtaining, generating
[FEATURE ID: 7] member account profiles, identity ratingsauthentication, information, credentials, identification, input, identity, account profiles[FEATURE ID: 7] unencrypted information, encryption key
[TRANSITIVE ID: 8] usingthrough, as, via, having, providing, requiring, indicating[TRANSITIVE ID: 8] requesting
[FEATURE ID: 9] identification components, combinationscomponents, codes, executable, identification, elements, statements, media[FEATURE ID: 9] computer executable instructions, executable code
[TRANSITIVE ID: 10] identifyingauthenticated, associated, authorized[TRANSITIVE ID: 10] encrypted
[FEATURE ID: 11] identity ratingaddress, identification, authorization, identity, attribute, entitlement, identifier[FEATURE ID: 11] activity
[FEATURE ID: 12] memberpin, login, certificate, password, credential, user, identifier[FEATURE ID: 12] passphrase, user PIN, username
[FEATURE ID: 13] initial rating factorsinformation, data, values[FEATURE ID: 13] date information indicative
[FEATURE ID: 14] number, keystroke patternslocation, validity, activity, time, accuracy, content, age[FEATURE ID: 14] date
[FEATURE ID: 15] authenticationcredential, certificate, transaction[FEATURE ID: 15] role
[FEATURE ID: 16] devicepassword, number, parameter, name, location, code[FEATURE ID: 16] secret key, validity duration
[FEATURE ID: 17] locationmessage, key, signature, password[FEATURE ID: 17] token key
[FEATURE ID: 18] timecurrent time, real time, current[FEATURE ID: 18] time
[FEATURE ID: 19] claimparagraph, item, step, invention, feature, fact, clair[FEATURE ID: 19] claim
1 . A method [FEATURE ID: 1]

of providing [TRANSITIVE ID: 2]

identity verification [FEATURE ID: 3]

and management [FEATURE ID: 3]

for a social network system [FEATURE ID: 4]

, the method comprising [TRANSITIVE ID: 5]

: creating [TRANSITIVE ID: 6]

member account profiles [FEATURE ID: 7]

for members [FEATURE ID: 3]

of the social network system using [TRANSITIVE ID: 8]

identification components [FEATURE ID: 9]

for identifying [TRANSITIVE ID: 10]

members ; generating [TRANSITIVE ID: 2]

an identity rating [FEATURE ID: 11]

for each member [FEATURE ID: 12]

using initial rating factors [FEATURE ID: 13]

including [TRANSITIVE ID: 5]

: number [FEATURE ID: 14]

of identification components , quality [FEATURE ID: 3]

of identification components , and presence [FEATURE ID: 3]

of an in - person authentication ; determining [TRANSITIVE ID: 2]

member identity rating thresholds [FEATURE ID: 3]

for identity rating - restricted services [FEATURE ID: 3]

; authenticating [TRANSITIVE ID: 2]

a member attempting to access one or more identity rating - restricted services over the social network system , wherein the authentication [FEATURE ID: 15]

includes confirmation [FEATURE ID: 3]

of a member - registered device [FEATURE ID: 16]

, confirmation of a member - registered location [FEATURE ID: 17]

, confirmation of a member - registered biometric [FEATURE ID: 1]

, and combinations [FEATURE ID: 9]

thereof ; managing the member ' s identity rating in real - time [FEATURE ID: 18]

, wherein the member ' s identity rating is altered in real - time by monitoring member identity rating [FEATURE ID: 3]

- altering factors [FEATURE ID: 3]

including keystroke patterns [FEATURE ID: 14]

and language analysis [FEATURE ID: 3]

; providing member - to - member restrictions [FEATURE ID: 3]

using the managed identity ratings [FEATURE ID: 7]

, wherein access [FEATURE ID: 3]

to network [FEATURE ID: 1]

- based content [FEATURE ID: 3]

and member - to - member interactions [FEATURE ID: 3]

is restricted based on member identity ratings thresholds [FEATURE ID: 3]

; and blocking access to the social network system by unauthenticated members . 2 . The method of claim [FEATURE ID: 19]

1 . A method [FEATURE ID: 1]

of restricting [TRANSITIVE ID: 2]

access [FEATURE ID: 3]

to a target system [FEATURE ID: 1]

, comprising [TRANSITIVE ID: 5]

: receiving [TRANSITIVE ID: 6]

an encrypted [TRANSITIVE ID: 10]

passphrase [FEATURE ID: 12]

, wherein the encrypted passphrase is resented by a user [FEATURE ID: 4]

requesting [TRANSITIVE ID: 8]

access to the target system ; obtaining [TRANSITIVE ID: 6]

a secret key [FEATURE ID: 16]

associated with the target system ; receiving unencrypted information [FEATURE ID: 7]

associated with the encrypted passphrase ; receiving a user PIN [FEATURE ID: 12]

; generating [TRANSITIVE ID: 6]

a token key [FEATURE ID: 17]

using [TRANSITIVE ID: 5]

the secret key associated with the target system and the unencrypted information associated with the encrypted passphrase ; generating an encryption key [FEATURE ID: 7]

using the secret key , the user PIN , and the unencrypted information ; generating a decrypted passphrase from the encrypted passphrase using the encryption key to decrypt the encrypted passphrase , the decrypted passphrase including a first portion and a second portion , wherein the first portion of the decrypted passphrase is generated by one - way encoding at least a portion of access credentials [FEATURE ID: 3]

of the user using the token key , wherein the second portion of the decrypted passphrase includes the portion of the access credentials ; one - way encoding the second portion of the decrypted passphrase using the token key to provide a one - way encoded portion of the decrypted passphrase ; comparing the one - way encoded portion of the decrypted passphrase with the first portion of the decrypted passphrase ; and denying access into the target system if the one - way encoded portion of the decrypted passphrase does not match the first portion of the decrypted passphrase . 2 . The method according to claim [FEATURE ID: 19]

1 , further comprising : if the one - way encoded portion matches the first portion of the decrypted passphrase , determining validity [FEATURE ID: 3]

of the second portion , wherein if the second portion is valid , access into the target system is allowed and wherein if the second portion is not valid , access into the target system is denied . 3 . The method according to claim 1 , wherein said unencrypted information includes time [FEATURE ID: 18]

/ date information indicative [FEATURE ID: 13]

of date [FEATURE ID: 14]

and time associated with the second portion . 4 . The method according to claim 1 , wherein said target system is a storage device [FEATURE ID: 1]

. 5 . The method according to claim 1 , wherein the second portion of the decrypted passphrase includes at least one of : a username [FEATURE ID: 12]

that identifies a user , a validity duration [FEATURE ID: 16]

for which access is allowed , a role [FEATURE ID: 15]

for the user , and an activity [FEATURE ID: 11]

of the user . 6 . The method according to claim 1 , wherein receiving the encrypted passphrase includes retrieving the encrypted passphrase from at least one of : a smartcard [FEATURE ID: 1]

, a memory stick , a floppy disk , and a CD . 7 . The method according to claim 1 , wherein one - way encoding includes using a hashing algorithm SHA [FEATURE ID: 1]

- 256 , and wherein the encrypted passphrase is at least one of Triple DES encrypted and AES encrypted . 8 . A non-transitory computer readable medium [FEATURE ID: 4]

having computer executable instructions [FEATURE ID: 9]

for restricting access to a target system , the instructions [FEATURE ID: 1]

comprising executable code [FEATURE ID: 9]

for : receiving an encrypted passphrase , wherein the encrypted passphrase is presented by a user requesting access to the target system ; obtaining a secret key associated with the target system ; receiving unencrypted information associated with the encrypted passphrase ; receiving a user PIN ; generating a token key using the secret key associated with the target system and the unencrypted information associated with the encrypted passphrase ; generating an encryption key using the secret key , the user PIN , and the unencrypted information ; generating a decrypted passphrase from the encrypted passphrase using the encryption key to decrypt the encrypted passphrase , the decrypted passphrase including a first portion and a second portion , wherein the first portion of the decrypted passphrase is generated by one - way encoding at least a portion of access credentials of the user using the token key , wherein the second portion of the decrypted passphrase includes the portion of the access credentials ; one - way encoding the second portion of the decrypted passphrase using the token key to provide a one - way encoded portion of the decrypted passphrase ; comparing the one - way encoded portion of the decrypted passphrase with the first portion of the decrypted passphrase ; and denying access into the target system if the one - way encoded portion of the decrypted passphrase does not match the first portion of the decrypted passphrase . 9 . The non-transitory computer readable medium according to claim 8 , wherein said unencrypted information includes time / date information indicative of date and time associated with second portion . 10 . The non-transitory computer readable medium according to claim 8 , wherein said target system is a storage device . 11 . The non-transitory computer readable medium according to claim 8 , wherein the second portion of the decrypted passphrase includes at least one of : a username that identifies a user , a validity duration for which access is allowed , a role for the user , and an activity of the user . 12 . The non-transitory computer readable medium according to claim 8 , wherein the encrypted passphrase is received from at least one of : a smartcard , a memory stick , a floppy disk , and a CD . 13 . The non-transitory computer readable medium according to claim 8 , wherein one - way encoding includes using a hashing algorithm SHA - 256 , and wherein the encrypted passphrase is at least one of Triple DES encrypted and AES encrypted . 14 . The non-transitory computer readable medium according to claim 8 , wherein , if the one - way encoded portion matches the first portion of the decrypted passphrase , determining validity of the second portion , wherein if the second portion is valid , access into the target system is allowed and wherein if the second portion is not valid , access into the target system is denied . 15 . A device [FEATURE ID: 1]

including at least one processor [FEATURE ID: 4]

that restricts access to a target system , the at least one processing [FEATURE ID: 4]








Targeted Patent:

Patent: US8850535B2
Filed: 2011-08-05
Issued: 2014-09-30
Patent Holder: (Original Assignee) Safefaces LLC     (Current Assignee) Street Spirit Ip LLC
Inventor(s): Jason J. Liberman, David Scott Trandal

Title: Methods and systems for identity verification in a social network using ratings

 
Cross Reference / Shared Meaning between the Lines
Charted Against:

Patent: US20110102570A1
Filed: 2008-04-14
Issued: 2011-05-05
Patent Holder: (Original Assignee) Pointgrab Ltd     (Current Assignee) Pointgrab Ltd
Inventor(s): Saar Wilf, Haim Perski, Amir Kaplan

Title: Vision based pointing device emulation

[FEATURE ID: 1] methodcomputer method, mechanism, system, process, methods, methodology, technique[FEATURE ID: 1] method
[TRANSITIVE ID: 2] providingfacilitating, implementing, managing[TRANSITIVE ID: 2] providing
[FEATURE ID: 3] managementrecognition, control, monitoring[FEATURE ID: 3] tracking
[FEATURE ID: 4] social network system, agentperson, party, human, company, object, user[FEATURE ID: 4] hand
[TRANSITIVE ID: 5] comprising, includingby, of, involving, containing, having, performing, being[TRANSITIVE ID: 5] comprising
[TRANSITIVE ID: 6] creating, generating, determining, authenticatingidentifying, receiving, registering, providing, monitoring, obtaining, establishing[TRANSITIVE ID: 6] capturing, tracking
[FEATURE ID: 7] member account profiles, initial rating factors, factors, contentinformation, data, features, characteristics, attributes, rules, activities[FEATURE ID: 7] images
[TRANSITIVE ID: 8] usingand, of, as[TRANSITIVE ID: 8] according
[TRANSITIVE ID: 9] identifyingthe, that, each, such[TRANSITIVE ID: 9] said
[FEATURE ID: 10] identity rating, member, device, biometric, networkuser, identifier, individual, identity, application, account, time[FEATURE ID: 10] electronic display
[FEATURE ID: 11] numbercollection, combination, sequence, accuracy, size, strength[FEATURE ID: 11] second set, resolution
[FEATURE ID: 12] quality, keystroke patterns, language analysislocation, activity, biometrics, context, rotation, identity, direction[FEATURE ID: 12] movement, position
[FEATURE ID: 13] presence, member identity ratingstatus, performance, speed, behavior, value, quality, profile[FEATURE ID: 13] parameter
[FEATURE ID: 14] servicescontent, functionality, information[FEATURE ID: 14] interaction
[FEATURE ID: 15] authenticationmethod, step, response, determination[FEATURE ID: 15] movement control
[FEATURE ID: 16] confirmation, combinationsrecognition, identification, use, acceptance, validation, completion, activation[FEATURE ID: 16] performance, emulation
[FEATURE ID: 17] locationperson, user, object[FEATURE ID: 17] hand movement
[FEATURE ID: 18] accesscontrol, usage, use[FEATURE ID: 18] object movement control
[FEATURE ID: 19] claimembodiment, aspect, paragraph, item, clause, figure, requirement[FEATURE ID: 19] claim
1 . A method [FEATURE ID: 1]

of providing [TRANSITIVE ID: 2]

identity verification and management [FEATURE ID: 3]

for a social network system [FEATURE ID: 4]

, the method comprising [TRANSITIVE ID: 5]

: creating [TRANSITIVE ID: 6]

member account profiles [FEATURE ID: 7]

for members of the social network system using [TRANSITIVE ID: 8]

identification components for identifying [TRANSITIVE ID: 9]

members ; generating [TRANSITIVE ID: 6]

an identity rating [FEATURE ID: 10]

for each member [FEATURE ID: 10]

using initial rating factors [FEATURE ID: 7]

including [TRANSITIVE ID: 5]

: number [FEATURE ID: 11]

of identification components , quality [FEATURE ID: 12]

of identification components , and presence [FEATURE ID: 13]

of an in - person authentication ; determining [TRANSITIVE ID: 6]

member identity rating thresholds for identity rating - restricted services [FEATURE ID: 14]

; authenticating [TRANSITIVE ID: 6]

a member attempting to access one or more identity rating - restricted services over the social network system , wherein the authentication [FEATURE ID: 15]

includes confirmation [FEATURE ID: 16]

of a member - registered device [FEATURE ID: 10]

, confirmation of a member - registered location [FEATURE ID: 17]

, confirmation of a member - registered biometric [FEATURE ID: 10]

, and combinations [FEATURE ID: 16]

thereof ; managing the member ' s identity rating in real - time , wherein the member ' s identity rating is altered in real - time by monitoring member identity rating [FEATURE ID: 13]

- altering factors [FEATURE ID: 7]

including keystroke patterns [FEATURE ID: 12]

and language analysis [FEATURE ID: 12]

; providing member - to - member restrictions using the managed identity ratings , wherein access [FEATURE ID: 18]

to network [FEATURE ID: 10]

- based content [FEATURE ID: 7]

and member - to - member interactions is restricted based on member identity ratings thresholds ; and blocking access to the social network system by unauthenticated members . 2 . The method of claim [FEATURE ID: 19]

1 , wherein the creating of member account profiles includes in - person authentication by an authorized agent [FEATURE ID: 4]

1 - 84 . ( canceled ) 85 . A method [FEATURE ID: 1]

for object movement control [FEATURE ID: 18]

in a device associated with an electronic display [FEATURE ID: 10]

, the method comprising [TRANSITIVE ID: 5]

: capturing [TRANSITIVE ID: 6]

images [FEATURE ID: 7]

of at least one hand [FEATURE ID: 4]

; tracking [TRANSITIVE ID: 6]

movement [FEATURE ID: 12]

of the at least one hand ; providing [TRANSITIVE ID: 2]

object movement control of the object , said [TRANSITIVE ID: 9]

object displayed on the electronic display , the movement control [FEATURE ID: 15]

based on the tracking [FEATURE ID: 3]

of the hand movement [FEATURE ID: 17]

; and if the hand movement is a gesture , providing object position at the object ' s position prior to performance [FEATURE ID: 16]

of the gesture . 86 . The method according [TRANSITIVE ID: 8]

to claim [FEATURE ID: 19]

85 wherein tracking of the hand movement comprises tracking a position [FEATURE ID: 12]

of a base of the hand ; and wherein a gesture consists of movement of at least one finger or part of finger . 87 . The method according to claim 85 further comprising : tracking at least one finger or part of finger ; and providing interaction [FEATURE ID: 14]

in addition to object movement control based on tracking the at least one finger part or finger . 88 . The method according to claim 87 , wherein the object movement control is based on tracking the base of the hand and a first set of fingers of the hand and interaction in addition to object movement control is based on tracking one or more fingers from a second set [FEATURE ID: 11]

of fingers . 89 . The method according to claim 87 , wherein providing interaction in addition to object movement control comprises providing emulation [FEATURE ID: 16]

of mouse clicking . 90 . The method according to claim 87 , wherein providing interaction in addition to object movement control is based on a gesture performed by the at least one finger or part or finger . 91 . The method according to claim 90 , wherein a gesture associated with mouse click down is defined by adduction of the finger and mouse click up is defined by abduction of the finger . 92 . The method according to claim 91 , wherein the finger is a thumb . 93 . The method according to claim 90 , wherein a gesture associated with mouse click is defined by flexion and extension of a finger . 94 . The method according to claim 90 , wherein a gesture associated with mouse click is defined by a finger lifting and lowering movement . 95 . The method according to claim 90 , further comprising : identifying the finger or part of finger performing the gesture ; and performing one of right mouse click , left mouse click , right mouse down , left mouse down , right mouse up , left mouse up based on the identifying . 96 . The method according to claim 87 , wherein providing interaction in addition to object movement control comprises changing a parameter [FEATURE ID: 13]

of the object movement control . 97 . The method according to claim 96 , wherein the parameter is resolution [FEATURE ID: 11]








Targeted Patent:

Patent: US8850535B2
Filed: 2011-08-05
Issued: 2014-09-30
Patent Holder: (Original Assignee) Safefaces LLC     (Current Assignee) Street Spirit Ip LLC
Inventor(s): Jason J. Liberman, David Scott Trandal

Title: Methods and systems for identity verification in a social network using ratings

 
Cross Reference / Shared Meaning between the Lines
Charted Against:

Patent: US20110047045A1
Filed: 2008-08-14
Issued: 2011-02-24
Patent Holder: (Original Assignee) Individual     (Current Assignee) Payfone Inc
Inventor(s): Michael Brody, Rodger Desai, Sung Kim

Title: System and method for paying a merchant by a registered user using a cellular telephone account

[FEATURE ID: 1] method, members, initial rating factors, person authentication, location, factors, member restrictions, network, member interactions, agentuser, computer, member, mechanism, device, information, terminal[FEATURE ID: 1] method, merchant, payment processor, services provider, request, telephone, mobile telephone account, steps, system
[TRANSITIVE ID: 2] providingsecure, personal, trusted[TRANSITIVE ID: 2] sineroaming
[FEATURE ID: 3] identity verification, identity rating, authentication, confirmation, combinations, identity ratings, member identity ratings thresholdsauthorization, identification, evaluation, identity, account, credit, registration[FEATURE ID: 3] account identifier, payment
[FEATURE ID: 4] managementtracking, verification, monitoring[FEATURE ID: 4] verifying
[FEATURE ID: 5] social network system, biometric, law enforcement officecustomer, merchant, transaction, business, consumer, subscriber, person[FEATURE ID: 5] product, user, account identifier responsive, mobile
[TRANSITIVE ID: 6] comprising, using, includinghaving, of, by, includes, comprises, involving, containing[TRANSITIVE ID: 6] comprising, has
[TRANSITIVE ID: 7] creating, generating, authenticatingidentifying, providing, determining, updating, establishing, storing, registering[TRANSITIVE ID: 7] receiving, associating, generating
[FEATURE ID: 8] member account profilesidentification, account, information[FEATURE ID: 8] amount
[FEATURE ID: 9] identification componentsindicia, authentication, identification[FEATURE ID: 9] identifier
[TRANSITIVE ID: 10] identifyingsuch, that, the, registered, which, their, different[TRANSITIVE ID: 10] corresponding, said, other
[FEATURE ID: 11] member, quality, keystroke patternsidentity, user, identifier, number, registration, password, location[FEATURE ID: 11] telephone number, user identifier, second international mobile subscriber identity code
[FEATURE ID: 12] numberutilization, usage, presence, use[FEATURE ID: 12] possession
[TRANSITIVE ID: 13] determiningapplying, registering, providing[TRANSITIVE ID: 13] paying
[FEATURE ID: 14] services, contentfunctions, operations, transactions, information, applications, resources, systems[FEATURE ID: 14] services action
[FEATURE ID: 15] deviceapplication, network, phone[FEATURE ID: 15] related product
[FEATURE ID: 16] member identity ratingrate, access, value[FEATURE ID: 16] charge responsive
[FEATURE ID: 17] accessmodification, subscription, reference, connection[FEATURE ID: 17] first international mobile subscriber identity code responsive
[FEATURE ID: 18] claimfigure, clause, clair, the claim, paragraph, embodiment, item[FEATURE ID: 18] claim
1 . A method [FEATURE ID: 1]

of providing [TRANSITIVE ID: 2]

identity verification [FEATURE ID: 3]

and management [FEATURE ID: 4]

for a social network system [FEATURE ID: 5]

, the method comprising [TRANSITIVE ID: 6]

: creating [TRANSITIVE ID: 7]

member account profiles [FEATURE ID: 8]

for members [FEATURE ID: 1]

of the social network system using [TRANSITIVE ID: 6]

identification components [FEATURE ID: 9]

for identifying [TRANSITIVE ID: 10]

members ; generating [TRANSITIVE ID: 7]

an identity rating [FEATURE ID: 3]

for each member [FEATURE ID: 11]

using initial rating factors [FEATURE ID: 1]

including [TRANSITIVE ID: 6]

: number [FEATURE ID: 12]

of identification components , quality [FEATURE ID: 11]

of identification components , and presence of an in - person authentication [FEATURE ID: 1]

; determining [TRANSITIVE ID: 13]

member identity rating thresholds for identity rating - restricted services [FEATURE ID: 14]

; authenticating [TRANSITIVE ID: 7]

a member attempting to access one or more identity rating - restricted services over the social network system , wherein the authentication [FEATURE ID: 3]

includes confirmation [FEATURE ID: 3]

of a member - registered device [FEATURE ID: 15]

, confirmation of a member - registered location [FEATURE ID: 1]

, confirmation of a member - registered biometric [FEATURE ID: 5]

, and combinations [FEATURE ID: 3]

thereof ; managing the member ' s identity rating in real - time , wherein the member ' s identity rating is altered in real - time by monitoring member identity rating [FEATURE ID: 16]

- altering factors [FEATURE ID: 1]

including keystroke patterns [FEATURE ID: 11]

and language analysis ; providing member - to - member restrictions [FEATURE ID: 1]

using the managed identity ratings [FEATURE ID: 3]

, wherein access [FEATURE ID: 17]

to network [FEATURE ID: 1]

- based content [FEATURE ID: 14]

and member - to - member interactions [FEATURE ID: 1]

is restricted based on member identity ratings thresholds [FEATURE ID: 3]

; and blocking access to the social network system by unauthenticated members . 2 . The method of claim [FEATURE ID: 18]

1 , wherein the creating of member account profiles includes in - person authentication by an authorized agent [FEATURE ID: 1]

. 3 . The method of claim 1 , wherein the authorized agent is a law enforcement office [FEATURE ID: 5]

1 . A method [FEATURE ID: 1]

of paying [TRANSITIVE ID: 13]

for a product [FEATURE ID: 5]

or service , comprising [TRANSITIVE ID: 6]

: at a first time , receiving [TRANSITIVE ID: 7]

from a merchant [FEATURE ID: 1]

by a payment processor [FEATURE ID: 1]

that is a sineroaming [FEATURE ID: 2]

roaming services provider [FEATURE ID: 1]

, an account identifier [FEATURE ID: 3]

for a user [FEATURE ID: 5]

at that merchant , and a telephone number [FEATURE ID: 11]

of the user as a request [FEATURE ID: 1]

for payment [FEATURE ID: 3]

to the merchant by the sineroaming roaming services provider ; verifying [TRANSITIVE ID: 4]

that the user has [TRANSITIVE ID: 6]

possession [FEATURE ID: 12]

of the telephone [FEATURE ID: 1]

corresponding [TRANSITIVE ID: 10]

to the telephone number received ; associating [TRANSITIVE ID: 7]

the telephone number with the account identifier responsive [FEATURE ID: 5]

to the verifying that the user has possession of said [TRANSITIVE ID: 10]

telephone ; at a second time , subsequent to the first time , receiving by the payment processor an amount [FEATURE ID: 8]

from the merchant for the product or service , other [FEATURE ID: 10]

than roaming or another mobile [FEATURE ID: 5]

- related product [FEATURE ID: 15]

or service and at least one selected from the account identifier and the telephone number ; responsive to the account identifier or telephone number or both received at second time , determining whether the telephone number was associated with the account identifier ; generating , to a mobile telephone account [FEATURE ID: 1]

corresponding to the telephone number received , a roaming charge responsive [FEATURE ID: 16]

to the amount without verifying that said user has possession of said telephone between the second time and the generating step ; causing the merchant to perform a goods or services action [FEATURE ID: 14]

without verifying that said user has possession of said telephone between the second time and the causing the merchant to perform step ; and causing the merchant to be provided funds responsive to the amount without verifying that said user has possession of said telephone between the second time and the causing the merchant to be provided step . 2 . The method of claim [FEATURE ID: 18]

1 , wherein at least one selected from the generating [FEATURE ID: 7]

and both causing steps [FEATURE ID: 1]

are responsive to the determining step . 3 . The method of claim 1 , additionally comprising associating an identifier [FEATURE ID: 9]

of the merchant with at least one selected from the telephone number and the account identifier . 4 . The method of claim 1 , additionally comprising , at the merchant , at each of the first time and the second time : receiving a user identifier [FEATURE ID: 11]

from the user ; converting the user identifier received into the account identifier , the user identifier received from the user being different from the account identifier ; and providing the account identifier to a payment processor . 5 . The method of claim 4 , wherein at the first time , the merchant indicates that the user is being registered . 6 . The method of claim 1 : additionally comprising : obtaining a first international mobile subscriber identity code responsive [FEATURE ID: 17]

to the telephone number received at the first time ; obtaining a second international mobile subscriber identity code responsive to the telephone number received at the second time ; and comparing the first international mobile subscriber identity code and the second international mobile subscriber identity code [FEATURE ID: 11]

; and wherein at least one selected from the generating and both causing steps are responsive to the comparing step . 7 . The method of claim 2 : additionally comprising : obtaining a first international mobile subscriber identity code responsive to the telephone number received at the first time ; obtaining a second international mobile subscriber identity code responsive to the telephone number received at the second time ; and comparing the first international mobile subscriber identity code and the second international mobile subscriber identity code ; and wherein at least one selected from the generating and both causing steps are responsive or additionally responsive to the comparing step . 8 . A system [FEATURE ID: 1]








Targeted Patent:

Patent: US8850535B2
Filed: 2011-08-05
Issued: 2014-09-30
Patent Holder: (Original Assignee) Safefaces LLC     (Current Assignee) Street Spirit Ip LLC
Inventor(s): Jason J. Liberman, David Scott Trandal

Title: Methods and systems for identity verification in a social network using ratings

 
Cross Reference / Shared Meaning between the Lines
Charted Against:

Patent: US7895653B2
Filed: 2007-05-31
Issued: 2011-02-22
Patent Holder: (Original Assignee) International Business Machines Corp     (Current Assignee) International Business Machines Corp
Inventor(s): Seraphin B. Calo, Kang-won Lee, Kyoungsoo Park

Title: Internet robot detection for network distributable markup

[FEATURE ID: 1] method, providingdevice, network, computer, server, machine, client, mechanism[FEATURE ID: 1] bot detection method, method, content browser, computer usable storage medium, computer hardware system, content distribution data processing hardware system, system, content server
[FEATURE ID: 2] social network systemcomputer, subject, server, person, host, controller, user[FEATURE ID: 2] human actor, computer program product, requester
[TRANSITIVE ID: 3] comprising, using, generating, including, determining, authenticatingproviding, identifying, containing, performing, establishing, by, implementing[TRANSITIVE ID: 3] comprising, embedding
[TRANSITIVE ID: 4] creatingidentifying, establishing, providing, receiving[TRANSITIVE ID: 4] determining
[FEATURE ID: 5] members, identification components, unauthenticated membersagents, individuals, subscribers, entities, customers, devices, components[FEATURE ID: 5] clients
[FEATURE ID: 6] identity ratingattribute, identifier, image, annotation, overlay, indicator, entry[FEATURE ID: 6] activatable link, empty content style sheet
[FEATURE ID: 7] initial rating factors, member identity rating, factors, language analysisinformation, data, inputs, behavior, components, authentication, activity[FEATURE ID: 7] computer usable program code, human activity
[FEATURE ID: 8] number, quality, authenticationlocation, existence, registration, receipt, response, identity, nature[FEATURE ID: 8] presence
[TRANSITIVE ID: 9] restrictedspecified, enabled, defined[TRANSITIVE ID: 9] configured
[FEATURE ID: 10] services, member restrictions, content, member interactionsinformation, network, data, access, membership, list, friend[FEATURE ID: 10] network distributable markup
[FEATURE ID: 11] confirmationthe, receipt, reception[FEATURE ID: 11] receive
[FEATURE ID: 12] device, agentcode, number, value, name, password, cookie, entity[FEATURE ID: 12] activatable fragment, network address, key, key pre-stored
[FEATURE ID: 13] locationobject, network, agent, message, password, software, application[FEATURE ID: 13] mouse movement, extraneous resource, other network distributable markup
[FEATURE ID: 14] biometricaction, event, activity[FEATURE ID: 14] activation signal
[FEATURE ID: 15] keystroke patternsaudio, video, sound[FEATURE ID: 15] empty audio
[FEATURE ID: 16] accesscommunication, transmission, use, distribution[FEATURE ID: 16] bot detection
[FEATURE ID: 17] networkmedia, text, content[FEATURE ID: 17] Web pages
[FEATURE ID: 18] claimfigure, clause, claim of, clair, claims, paragraph, embodiment[FEATURE ID: 18] claim
1 . A method [FEATURE ID: 1]

of providing [TRANSITIVE ID: 1]

identity verification and management for a social network system [FEATURE ID: 2]

, the method comprising [TRANSITIVE ID: 3]

: creating [TRANSITIVE ID: 4]

member account profiles for members [FEATURE ID: 5]

of the social network system using [TRANSITIVE ID: 3]

identification components [FEATURE ID: 5]

for identifying members ; generating [TRANSITIVE ID: 3]

an identity rating [FEATURE ID: 6]

for each member using initial rating factors [FEATURE ID: 7]

including [TRANSITIVE ID: 3]

: number [FEATURE ID: 8]

of identification components , quality [FEATURE ID: 8]

of identification components , and presence of an in - person authentication ; determining [TRANSITIVE ID: 3]

member identity rating thresholds for identity rating - restricted [TRANSITIVE ID: 9]

services [FEATURE ID: 10]

; authenticating [TRANSITIVE ID: 3]

a member attempting to access one or more identity rating - restricted services over the social network system , wherein the authentication [FEATURE ID: 8]

includes confirmation [FEATURE ID: 11]

of a member - registered device [FEATURE ID: 12]

, confirmation of a member - registered location [FEATURE ID: 13]

, confirmation of a member - registered biometric [FEATURE ID: 14]

, and combinations thereof ; managing the member ' s identity rating in real - time , wherein the member ' s identity rating is altered in real - time by monitoring member identity rating [FEATURE ID: 7]

- altering factors [FEATURE ID: 7]

including keystroke patterns [FEATURE ID: 15]

and language analysis [FEATURE ID: 7]

; providing member - to - member restrictions [FEATURE ID: 10]

using the managed identity ratings , wherein access [FEATURE ID: 16]

to network [FEATURE ID: 17]

- based content [FEATURE ID: 10]

and member - to - member interactions [FEATURE ID: 10]

is restricted based on member identity ratings thresholds ; and blocking access to the social network system by unauthenticated members [FEATURE ID: 5]

. 2 . The method of claim [FEATURE ID: 18]

1 , wherein the creating of member account profiles includes in - person authentication by an authorized agent [FEATURE ID: 12]

1 . A bot detection method [FEATURE ID: 1]

comprising [TRANSITIVE ID: 3]

: embedding [TRANSITIVE ID: 3]

an activatable fragment [FEATURE ID: 12]

within requested network distributable markup [FEATURE ID: 10]

, the embedded activatable fragment configured [TRANSITIVE ID: 9]

to emit an activation signal [FEATURE ID: 14]

in response to a presence [FEATURE ID: 8]

of a human actor [FEATURE ID: 2]

; and determining [TRANSITIVE ID: 4]

a presence of a bot interacting with the network distributable markup in response to failing to receive [TRANSITIVE ID: 11]

the activation signal from the embedded activatable fragment , wherein the activatable fragment includes a script that responds to a mouse movement [FEATURE ID: 13]

by emitting the activation signal . 2 . The method [FEATURE ID: 1]

of claim [FEATURE ID: 18]

1 , wherein the activation signal is a network address [FEATURE ID: 12]

incorporating a key [FEATURE ID: 12]

. 3 . The method of claim 1 , wherein the embedding the activatable fragment comprises : configuring a link to an extraneous resource [FEATURE ID: 13]

to emit the activation signal upon activation by a content browser [FEATURE ID: 1]

rendering the requested network distributable markup ; and embedding the extraneous resource within the requested network distributable markup . 4 . The method of claim 3 , wherein the configuring the link comprises configuring a hidden hyperlink to other network distributable markup [FEATURE ID: 13]

to emit the activation signal . 5 . The method of claim 4 , wherein the presence of the bot interacting with the network distributable markup is determined in response to receiving an activation signal emitted from the hidden hyperlink . 6 . A computer program product [FEATURE ID: 2]

comprising a computer usable storage medium [FEATURE ID: 1]

having stored therein computer usable program code [FEATURE ID: 7]

for bot detection [FEATURE ID: 16]

, the computer usable program code , which when executed by a computer hardware system [FEATURE ID: 1]

, causes the computer hardware system to perform embedding an activatable fragment within requested network distributable markup , the embedded activatable fragment configured to emit an activation signal in response to a presence of a human actor ; and determining a presence of a bot interacting with the network distributable markup in response to failing to receive the activation signal from the embedded activatable fragment , wherein the activatable fragment includes a script that responds to a mouse movement by emitting the activation signal . 7 . The method of claim 6 , wherein the activation signal is a network address incorporating a key . 8 . The computer program product of claim 6 , wherein the embedding the activatable fragment , comprises : computer usable program code for configuring a link to an extraneous resource to emit the activation signal upon activation by a content browser rendering the requested network distributable markup ; and computer usable program code for embedding the extraneous resource within the requested network distributable markup . 9 . The computer program product of claim 8 , wherein the configuring the link comprises configuring a hidden hyperlink to other network distributable markup to emit the activation signal . 10 . The computer program product of claim 9 , wherein the presence of the bot interacting with the network distributable markup is determined in response to receiving an activation signal emitted from the hidden hyperlink . 11 . A bot detection method comprising : embedding an activatable fragment within requested network distributable markup , the embedded activatable fragment configured to emit an activation signal in response to a presence of a human actor ; and determining a presence of a bot interacting with the network distributable markup , wherein the activatable fragment includes a script that responds to human activity [FEATURE ID: 7]

by emitting an activation signal including a network address incorporating a key ; the determining the presence of the bot comprises comparing the key with a key pre-stored [FEATURE ID: 12]

in association with a requester [FEATURE ID: 2]

of the network distributable markup and the network distributable markup , and the presence of the bot is determined upon the keys not matching . 12 . A bot detection method comprising : embedding an activatable fragment within requested network distributable markup , the embedded activatable fragment configured to emit an activation signal in response to a presence of a human actor ; and determining a presence of a bot interacting with the network distributable markup in response to failing to receive the activation signal from the embedded activatable fragment , wherein the embedding the activatable fragment comprises : configuring a link to an extraneous resource to emit the activation signal upon activation by a content browser rendering the requested network distributable markup , and embedding the extraneous resource within the requested network distributable markup , and the extraneous resource is selected from the group consisting of an activatable link [FEATURE ID: 6]

to an empty content style sheet [FEATURE ID: 6]

, an activatable link to a transparent pixel , and an activatable link to empty audio [FEATURE ID: 15]

. 13 . A content distribution data processing hardware system [FEATURE ID: 1]

configured for bot detection , the system [FEATURE ID: 1]

comprising : a content server [FEATURE ID: 1]

configured to distribute Web pages [FEATURE ID: 17]

to requesting clients [FEATURE ID: 5]








Targeted Patent:

Patent: US8850535B2
Filed: 2011-08-05
Issued: 2014-09-30
Patent Holder: (Original Assignee) Safefaces LLC     (Current Assignee) Street Spirit Ip LLC
Inventor(s): Jason J. Liberman, David Scott Trandal

Title: Methods and systems for identity verification in a social network using ratings

 
Cross Reference / Shared Meaning between the Lines
Charted Against:

Patent: US7886334B1
Filed: 2006-12-11
Issued: 2011-02-08
Patent Holder: (Original Assignee) Qurio Holdings Inc     (Current Assignee) Qurio Holdings Inc
Inventor(s): Richard Walsh, Christopher Amidon, Alfredo Issa

Title: System and method for social network trust assessment

[FEATURE ID: 1] method, location, contentsoftware, network, device, computer, server, media, database[FEATURE ID: 1] system, non-transitory computer, knowledge base
[FEATURE ID: 2] managementvalidation, authentication, security, verification[FEATURE ID: 2] trust assessment
[FEATURE ID: 3] social network system, biometric, agentserver, database, person, client, device, organization, website[FEATURE ID: 3] computing device, processor, second user
[TRANSITIVE ID: 4] comprising, using, includingcontaining, providing, representing, of, incorporating, being, with[TRANSITIVE ID: 4] comprising, having, identifying, including
[TRANSITIVE ID: 5] creating, generating, determining, authenticatingidentifying, establishing, providing, maintaining, developing, receiving, assessing[TRANSITIVE ID: 5] determining
[FEATURE ID: 6] member account profilesrecords, databases, entries, attributes, information[FEATURE ID: 6] data items
[FEATURE ID: 7] identification components, member identity rating thresholds, factorsparameters, criteria, rules, features, attributes, techniques, conditions[FEATURE ID: 7] data
[FEATURE ID: 8] initial rating factorsdata, factors, questions, responses, metrics, inputs, information[FEATURE ID: 8] trust assessment questions, scores
[FEATURE ID: 9] presencestatus, confidence, reliability, authenticity, integrity[FEATURE ID: 9] trust level
[FEATURE ID: 10] confirmationreceipt, determination, acquisition, creation, the, transmission[FEATURE ID: 10] generation
[FEATURE ID: 11] member identity rating, member restrictions, member identity ratings thresholdsinformation, access, member, system, identification, knowledge, relationship[FEATURE ID: 11] trust, trust assessment data
[FEATURE ID: 12] identity ratingsscoring, results, evaluation, assessments, score[FEATURE ID: 12] interrogation results
[FEATURE ID: 13] network, member interactionsgroup, list, user, information, membership, term, data[FEATURE ID: 13] relationship, data item
[FEATURE ID: 14] claimitem, paragraph, clair, claim of, figure, clause, embodiment[FEATURE ID: 14] claim
1 . A method [FEATURE ID: 1]

of providing identity verification and management [FEATURE ID: 2]

for a social network system [FEATURE ID: 3]

, the method comprising [TRANSITIVE ID: 4]

: creating [TRANSITIVE ID: 5]

member account profiles [FEATURE ID: 6]

for members of the social network system using [TRANSITIVE ID: 4]

identification components [FEATURE ID: 7]

for identifying members ; generating [TRANSITIVE ID: 5]

an identity rating for each member using initial rating factors [FEATURE ID: 8]

including [TRANSITIVE ID: 4]

: number of identification components , quality of identification components , and presence [FEATURE ID: 9]

of an in - person authentication ; determining [TRANSITIVE ID: 5]

member identity rating thresholds [FEATURE ID: 7]

for identity rating - restricted services ; authenticating [TRANSITIVE ID: 5]

a member attempting to access one or more identity rating - restricted services over the social network system , wherein the authentication includes confirmation [FEATURE ID: 10]

of a member - registered device , confirmation of a member - registered location [FEATURE ID: 1]

, confirmation of a member - registered biometric [FEATURE ID: 3]

, and combinations thereof ; managing the member ' s identity rating in real - time , wherein the member ' s identity rating is altered in real - time by monitoring member identity rating [FEATURE ID: 11]

- altering factors [FEATURE ID: 7]

including keystroke patterns and language analysis ; providing member - to - member restrictions [FEATURE ID: 11]

using the managed identity ratings [FEATURE ID: 12]

, wherein access to network [FEATURE ID: 13]

- based content [FEATURE ID: 1]

and member - to - member interactions [FEATURE ID: 13]

is restricted based on member identity ratings thresholds [FEATURE ID: 11]

; and blocking access to the social network system by unauthenticated members . 2 . The method of claim [FEATURE ID: 14]

1 , wherein the creating of member account profiles includes in - person authentication by an authorized agent [FEATURE ID: 3]

1 . A system [FEATURE ID: 1]

for determining [TRANSITIVE ID: 5]

trust [FEATURE ID: 11]

, the system comprising [TRANSITIVE ID: 4]

: a non-transitory computer [FEATURE ID: 1]

- readable media having [TRANSITIVE ID: 4]

a first knowledge base and a second knowledge based different from the first knowledge base stored thereon ; a computing device [FEATURE ID: 3]

having a processor [FEATURE ID: 3]

in communication with the knowledge base [FEATURE ID: 1]

, the computing device adapted to : receive a request to assess a target user ' s trust level [FEATURE ID: 9]

of a second user [FEATURE ID: 3]

, the request identifying [TRANSITIVE ID: 4]

a relationship [FEATURE ID: 13]

between the target user and the second user ; access trust assessment data including [TRANSITIVE ID: 4]

data [FEATURE ID: 7]

associated with the target user based on the relationship between the target user and the second user and a plurality of data items [FEATURE ID: 6]

where each data item [FEATURE ID: 13]

is associated with a trust level , wherein the trust assessment data [FEATURE ID: 11]

is selected from either the first knowledge base or the second knowledge base according to the relationship ; interrogate the second user , including presenting , to the second user , a plurality of trust assessment questions [FEATURE ID: 8]

including at least one trust assessment question based on the trust assessment data where the at least one trust assessment question is based on the relationship between the target user and the second user ; receive response data from the second user during the interrogation ; score the second user ' s response to each of the plurality of questions by comparing the response for each question to the trust assessment data corresponding to that question ; aggregate the scores [FEATURE ID: 8]

; assign a trust level to the second user based on the aggregated scores ; generate trust assessment [FEATURE ID: 2]

result data based on the interrogation results [FEATURE ID: 12]

, wherein the computing device is adapted to score , aggregate , and assign a trust level during generation [FEATURE ID: 10]

of the trust assessment result data ; and store the trust assessment result data . 2 . The system as set forth in claim [FEATURE ID: 14]








Targeted Patent:

Patent: US8850535B2
Filed: 2011-08-05
Issued: 2014-09-30
Patent Holder: (Original Assignee) Safefaces LLC     (Current Assignee) Street Spirit Ip LLC
Inventor(s): Jason J. Liberman, David Scott Trandal

Title: Methods and systems for identity verification in a social network using ratings

 
Cross Reference / Shared Meaning between the Lines
Charted Against:

Patent: US7870228B2
Filed: 2001-10-26
Issued: 2011-01-11
Patent Holder: (Original Assignee) Research in Motion Ltd     (Current Assignee) BlackBerry Ltd
Inventor(s): Denny K. Chiu, James A. Godfrey, Wen Gao

Title: System and method for remotely controlling mobile communication devices

[FEATURE ID: 1] method, location, network, member identity ratings thresholdsmessage, computer, platform, website, device, server, switch[FEATURE ID: 1] system, redirection system, host electronic messaging system, wireless network, device password, generic format
[TRANSITIVE ID: 2] providing, creating, generating, determining, authenticatingestablishing, receiving, identifying, performing, managing, initiating, obtaining[TRANSITIVE ID: 2] controlling
[FEATURE ID: 3] identity verificationservice, access, content[FEATURE ID: 3] user access
[FEATURE ID: 4] management, authenticationvalidation, registration, identification, receipt, authorization, protection[FEATURE ID: 4] entry
[FEATURE ID: 5] social network system, member, law enforcement officecustomer, client, user, device, server, human, consumer[FEATURE ID: 5] remote control system, user interface, mobile wireless communication device
[TRANSITIVE ID: 6] comprising, using, includinghaving, by, of, containing, include, providing, involving[TRANSITIVE ID: 6] comprising, identifies
[FEATURE ID: 7] member account profiles, member restrictions, identity ratings, member interactionsinformation, data, instructions, parameters, account, events, contents[FEATURE ID: 7] electronic messages, additional operations, control messages, status information
[FEATURE ID: 8] members, unauthenticated membersindividuals, entities, employees, subscribers, applications, customers, clients[FEATURE ID: 8] mobile wireless communication devices
[FEATURE ID: 9] identification components, member identity rating thresholds, services, factors, contentfeatures, parameters, systems, activities, resources, functions, settings[FEATURE ID: 9] operations
[TRANSITIVE ID: 10] identifying, restrictedassociated, specified, controlled, corresponding, identified, authorized[TRANSITIVE ID: 10] selected
[FEATURE ID: 11] identity ratingentry, address, image, indicator, identifier[FEATURE ID: 11] input
[FEATURE ID: 12] initial rating factors, combinationscomponents, feedback, changes, data, parameters, indications, confirmation[FEATURE ID: 12] information
[FEATURE ID: 13] number, quality, presence, language analysislocation, duration, type, validity, size, usage, reliability[FEATURE ID: 13] time, status
[FEATURE ID: 14] confirmation, accessuse, transmission, authorization, control, availability, permission, communication[FEATURE ID: 14] execution
[FEATURE ID: 15] devicenumber, activity, application, individual, schedule, name, event[FEATURE ID: 15] list, operation
[FEATURE ID: 16] biometrictime, date, event[FEATURE ID: 16] message
[FEATURE ID: 17] member identity ratingvalue, data, information[FEATURE ID: 17] recent control message
[FEATURE ID: 18] claimspecification, statement, paragraph, embodiment, clause, figure, item[FEATURE ID: 18] claim
1 . A method [FEATURE ID: 1]

of providing [TRANSITIVE ID: 2]

identity verification [FEATURE ID: 3]

and management [FEATURE ID: 4]

for a social network system [FEATURE ID: 5]

, the method comprising [TRANSITIVE ID: 6]

: creating [TRANSITIVE ID: 2]

member account profiles [FEATURE ID: 7]

for members [FEATURE ID: 8]

of the social network system using [TRANSITIVE ID: 6]

identification components [FEATURE ID: 9]

for identifying [TRANSITIVE ID: 10]

members ; generating [TRANSITIVE ID: 2]

an identity rating [FEATURE ID: 11]

for each member [FEATURE ID: 5]

using initial rating factors [FEATURE ID: 12]

including [TRANSITIVE ID: 6]

: number [FEATURE ID: 13]

of identification components , quality [FEATURE ID: 13]

of identification components , and presence [FEATURE ID: 13]

of an in - person authentication ; determining [TRANSITIVE ID: 2]

member identity rating thresholds [FEATURE ID: 9]

for identity rating - restricted [TRANSITIVE ID: 10]

services [FEATURE ID: 9]

; authenticating [TRANSITIVE ID: 2]

a member attempting to access one or more identity rating - restricted services over the social network system , wherein the authentication [FEATURE ID: 4]

includes confirmation [FEATURE ID: 14]

of a member - registered device [FEATURE ID: 15]

, confirmation of a member - registered location [FEATURE ID: 1]

, confirmation of a member - registered biometric [FEATURE ID: 16]

, and combinations [FEATURE ID: 12]

thereof ; managing the member ' s identity rating in real - time , wherein the member ' s identity rating is altered in real - time by monitoring member identity rating [FEATURE ID: 17]

- altering factors [FEATURE ID: 9]

including keystroke patterns and language analysis [FEATURE ID: 13]

; providing member - to - member restrictions [FEATURE ID: 7]

using the managed identity ratings [FEATURE ID: 7]

, wherein access [FEATURE ID: 14]

to network [FEATURE ID: 1]

- based content [FEATURE ID: 9]

and member - to - member interactions [FEATURE ID: 7]

is restricted based on member identity ratings thresholds [FEATURE ID: 1]

; and blocking access to the social network system by unauthenticated members [FEATURE ID: 8]

. 2 . The method of claim [FEATURE ID: 18]

1 , wherein the creating of member account profiles includes in - person authentication by an authorized agent . 3 . The method of claim 1 , wherein the authorized agent is a law enforcement office [FEATURE ID: 5]

1 . A system [FEATURE ID: 1]

for remotely controlling [TRANSITIVE ID: 2]

one or more operations [FEATURE ID: 9]

on a plurality of mobile wireless communication devices [FEATURE ID: 8]

, comprising [TRANSITIVE ID: 6]

: a redirection system [FEATURE ID: 1]

for execution [FEATURE ID: 14]

on one or more processors to redirect electronic messages [FEATURE ID: 7]

from a host electronic messaging system [FEATURE ID: 1]

to a wireless network [FEATURE ID: 1]

for transmission to the plurality of mobile wireless communication devices ; and a remote control system [FEATURE ID: 5]

for execution on the one or more processors to display a list [FEATURE ID: 15]

of operations that may be remotely controlled on the plurality of mobile wireless communication devices and further to receive an input [FEATURE ID: 11]

from a user interface [FEATURE ID: 5]

to select an operation [FEATURE ID: 15]

from the list of operations and , in response to the input , to generate a control message that identifies [TRANSITIVE ID: 6]

the selected [TRANSITIVE ID: 10]

operation and identifies a mobile wireless communication device [FEATURE ID: 5]

to receive the control message ; the remote control system to transmit the control message via the redirection system to the wireless network for transmission to the identified mobile wireless communication device , wherein the control message is configured to cause the identified mobile wireless communication device to execute the selected operation ; the remote control system to receive information [FEATURE ID: 12]

from the user interface to add additional operations [FEATURE ID: 7]

to the list of operations that may be remotely controlled on the plurality of mobile wireless communication devices ; wherein the remote control system displays a list of the plurality of mobile wireless communication devices , and wherein the mobile wireless communication device to receive the control message is selected from the list . 2 . The system of claim [FEATURE ID: 18]

1 , wherein the remote control system maintains a log file identifying control messages [FEATURE ID: 7]

that have been transmitted to each of the plurality of mobile wireless communication devices . 3 . The system of claim 2 , wherein the log file further identifies whether the control messages transmitted to each of the plurality of mobile wireless communication devices have been successfully executed . 4 . The system of claim 2 , wherein the log file includes status information [FEATURE ID: 7]

relating to the control messages transmitted to each of the plurality of mobile wireless communication devices . 5 . The system of claim 4 , wherein for each of the plurality of mobile wireless communication devices , the log file identifies a most recently control message [FEATURE ID: 16]

, a time [FEATURE ID: 13]

that the most recent control message [FEATURE ID: 17]

was transmitted and a status [FEATURE ID: 13]

of the most recent control message . 6 . The system of claim 5 , wherein the status of the most recent control message identifies whether the most recent control message has been received and executed . 7 . The system of claim 1 , wherein the one or more operations include disabling user access [FEATURE ID: 3]

to the mobile wireless communication device , resetting or changing a device password [FEATURE ID: 1]

, and locking user access to the mobile wireless communication device to require entry [FEATURE ID: 4]

of the device password . 8 . The system of claim 1 , wherein the control message is formatted in a generic format [FEATURE ID: 1]








Targeted Patent:

Patent: US8850535B2
Filed: 2011-08-05
Issued: 2014-09-30
Patent Holder: (Original Assignee) Safefaces LLC     (Current Assignee) Street Spirit Ip LLC
Inventor(s): Jason J. Liberman, David Scott Trandal

Title: Methods and systems for identity verification in a social network using ratings

 
Cross Reference / Shared Meaning between the Lines
Charted Against:

Patent: US20100328074A1
Filed: 2009-06-30
Issued: 2010-12-30
Patent Holder: (Original Assignee) Intel Corp     (Current Assignee) Intel Corp
Inventor(s): Erik J. Johnson, Dattatraya H. Kulkarni, Uttam K. Sengupta

Title: Human presence detection techniques

[FEATURE ID: 1] method, member identity rating, member restrictions, network, member interactions, claimsystem, server, user, membership, information, step, mode[FEATURE ID: 1] computer, method, claim, local application, remote application, security controller
[TRANSITIVE ID: 2] providingnetwork, remote, online[TRANSITIVE ID: 2] wired
[FEATURE ID: 3] identity verificationaccess, protection, operations, safety, content, authentication[FEATURE ID: 3] security
[FEATURE ID: 4] management, member, number, quality, person authentication, device, keystroke patterns, language analysislocation, profile, person, identity, language, context, validity[FEATURE ID: 4] presence
[FEATURE ID: 5] social network system, law enforcement officecustomer, human, device, client, processor, user, driver[FEATURE ID: 5] human operator, second value
[TRANSITIVE ID: 6] comprising, using, includingcontaining, having, providing, describing, of, identifying, by[TRANSITIVE ID: 6] comprising, representing, indicating
[TRANSITIVE ID: 7] creating, determining, authenticatingestablishing, identifying, obtaining, providing, monitoring, accepting, storing[TRANSITIVE ID: 7] receiving, generating
[FEATURE ID: 8] members, services, factors, contentresources, systems, operations, entities, components, accounts, devices[FEATURE ID: 8] physical sensors, sensors
[FEATURE ID: 9] identification components, member identity rating thresholdselements, parameters, components, systems, devices, physical, modules[FEATURE ID: 9] physical characteristics, physical sensors operative, memory units
[TRANSITIVE ID: 10] generatingassessing, predicting, identifying, establishing[TRANSITIVE ID: 10] determining
[FEATURE ID: 11] initial rating factorsmeasurements, values, information, events, the, signals, conditions[FEATURE ID: 11] sensor data, instructions, changes
[FEATURE ID: 12] presencestatus, confirmation, result[FEATURE ID: 12] human presence response
[TRANSITIVE ID: 13] restrictedbased, operated, enabled, readable, defined, controlled, managed[TRANSITIVE ID: 13] implemented, memory region accessible
[FEATURE ID: 14] authenticationtransaction, response, determination[FEATURE ID: 14] request
[FEATURE ID: 15] location, accesssystem, network, service, response, communication, application, object[FEATURE ID: 15] memory region, cryptographic algorithm, apparatus
[FEATURE ID: 16] biometric, agententity, person, organization, user, event, operator, object[FEATURE ID: 16] electronic device
1 . A method [FEATURE ID: 1]

of providing [TRANSITIVE ID: 2]

identity verification [FEATURE ID: 3]

and management [FEATURE ID: 4]

for a social network system [FEATURE ID: 5]

, the method comprising [TRANSITIVE ID: 6]

: creating [TRANSITIVE ID: 7]

member account profiles for members [FEATURE ID: 8]

of the social network system using [TRANSITIVE ID: 6]

identification components [FEATURE ID: 9]

for identifying members ; generating [TRANSITIVE ID: 10]

an identity rating for each member [FEATURE ID: 4]

using initial rating factors [FEATURE ID: 11]

including [TRANSITIVE ID: 6]

: number [FEATURE ID: 4]

of identification components , quality [FEATURE ID: 4]

of identification components , and presence [FEATURE ID: 12]

of an in - person authentication [FEATURE ID: 4]

; determining [TRANSITIVE ID: 7]

member identity rating thresholds [FEATURE ID: 9]

for identity rating - restricted [TRANSITIVE ID: 13]

services [FEATURE ID: 8]

; authenticating [TRANSITIVE ID: 7]

a member attempting to access one or more identity rating - restricted services over the social network system , wherein the authentication [FEATURE ID: 14]

includes confirmation of a member - registered device [FEATURE ID: 4]

, confirmation of a member - registered location [FEATURE ID: 15]

, confirmation of a member - registered biometric [FEATURE ID: 16]

, and combinations thereof ; managing the member ' s identity rating in real - time , wherein the member ' s identity rating is altered in real - time by monitoring member identity rating [FEATURE ID: 1]

- altering factors [FEATURE ID: 8]

including keystroke patterns [FEATURE ID: 4]

and language analysis [FEATURE ID: 4]

; providing member - to - member restrictions [FEATURE ID: 1]

using the managed identity ratings , wherein access [FEATURE ID: 15]

to network [FEATURE ID: 1]

- based content [FEATURE ID: 8]

and member - to - member interactions [FEATURE ID: 1]

is restricted based on member identity ratings thresholds ; and blocking access to the social network system by unauthenticated members . 2 . The method of claim [FEATURE ID: 1]

1 , wherein the creating of member account profiles includes in - person authentication by an authorized agent [FEATURE ID: 16]

. 3 . The method of claim 1 , wherein the authorized agent is a law enforcement office [FEATURE ID: 5]

1 . A computer [FEATURE ID: 1]

- implemented [TRANSITIVE ID: 13]

method [FEATURE ID: 1]

, comprising [TRANSITIVE ID: 6]

: receiving [TRANSITIVE ID: 7]

a request [FEATURE ID: 14]

to verify a presence [FEATURE ID: 4]

of a human operator [FEATURE ID: 5]

; determining [TRANSITIVE ID: 10]

whether the human operator is present at an electronic device [FEATURE ID: 16]

based on sensor data [FEATURE ID: 11]

received from one or more physical sensors [FEATURE ID: 8]

for the electronic device , the sensor data representing [TRANSITIVE ID: 6]

one or more physical characteristics [FEATURE ID: 9]

of the electronic device ; and generating [TRANSITIVE ID: 7]

a human presence response [FEATURE ID: 12]

indicating [TRANSITIVE ID: 6]

whether the human operator is present or not present at the electronic device based on the sensor data . 2 . The computer - implemented method of claim [FEATURE ID: 1]

1 , comprising generating a presence action sequence having one or more defined instructions [FEATURE ID: 11]

for the human operator to physically manipulate the electronic device . 3 . The computer - implemented method of claim 1 , comprising receiving the sensor data from the one or more physical sensors for the electronic device , the sensor data representing changes [FEATURE ID: 11]

in one or more physical characteristics of the electronic device when the electronic device is manipulated in accordance with a presence action sequence . 4 . The computer - implemented method of claim 1 , comprising reading the sensor data from an isolated memory region [FEATURE ID: 15]

. 5 . The computer - implemented method of claim 1 , comprising setting the human presence response to a first value to indicate the human operator is present at the electronic device when changes in one or more physical characteristics of the electronic device represented by the sensor data matches a presence action sequence . 6 . The computer - implemented method of claim 1 , comprising generating a human presence response to a second value [FEATURE ID: 5]

to indicate the human operator is not present at the electronic device when changes in one or more physical characteristics of the electronic device represented by the sensor data do not match a presence action sequence . 7 . The computer - implemented method of claim 1 , comprising receiving the request from a local application [FEATURE ID: 1]

. 8 . The computer - implemented method of claim 1 , comprising receiving the request from a remote application [FEATURE ID: 1]

over a wired [FEATURE ID: 2]

or wireless communications medium . 9 . The computer - implemented method of claim 1 , comprising sending the human presence response to a remote application over a wired or wireless communications medium using a cryptographic algorithm [FEATURE ID: 15]

. 10 . An apparatus [FEATURE ID: 15]

, comprising : one or more physical sensors operative [FEATURE ID: 9]

to monitor one or more physical characteristics of an electronic device ; and a security controller [FEATURE ID: 1]

communicatively coupled to the one or more physical sensors , the security controller operative to control security [FEATURE ID: 3]

for the electronic device , the security controller comprising a human presence module operative to receive a request to verify a presence of a human operator , determine whether the human operator is present at the electronic device based on sensor data received from the one or more physical sensors for the electronic device , the sensor data representing changes in one or more physical characteristics of the electronic device , and generate a human presence response indicating whether the human operator is present or not present at the electronic device based on the sensor data . 11 . The apparatus of claim 10 , comprising one or more memory units [FEATURE ID: 9]

with an isolated memory region and a shared memory region , the isolated memory region accessible [FEATURE ID: 13]

by only the security controller and the one or more sensors [FEATURE ID: 8]








Targeted Patent:

Patent: US8850535B2
Filed: 2011-08-05
Issued: 2014-09-30
Patent Holder: (Original Assignee) Safefaces LLC     (Current Assignee) Street Spirit Ip LLC
Inventor(s): Jason J. Liberman, David Scott Trandal

Title: Methods and systems for identity verification in a social network using ratings

 
Cross Reference / Shared Meaning between the Lines
Charted Against:

Patent: US7853663B2
Filed: 2004-03-12
Issued: 2010-12-14
Patent Holder: (Original Assignee) RIIP Inc     (Current Assignee) RIIP Inc
Inventor(s): David Hoerl, Izzy Leibovich, Paul Newman, Martin McGinnis

Title: Wireless management system for control of remote devices

[FEATURE ID: 1] method, social network system, networkcomputer, device, server, switch, user, apparatus, platform[FEATURE ID: 1] system, wireless KVM switch, user workstation, wireless transceiver, video conditioning circuitry, video conditioning circuit, method
[TRANSITIVE ID: 2] providingunified, centralized, distributed, remote, efficient, improved, managing[TRANSITIVE ID: 2] providing, integrated
[FEATURE ID: 3] identity verification, management, determining, member identity rating, member interactionsaccess, monitoring, security, membership, data, information, rating[FEATURE ID: 3] wireless monitoring, control
[TRANSITIVE ID: 4] comprisingincluding, providing, incorporating, featuring, encompassing, compromising, of[TRANSITIVE ID: 4] comprising
[TRANSITIVE ID: 5] creatingcollecting, obtaining, storing[TRANSITIVE ID: 5] receiving
[FEATURE ID: 6] members, member restrictionsservices, information, connections, member, resources, access, users[FEATURE ID: 6] available remote devices
[TRANSITIVE ID: 7] usingby, of, for, via, and, through[TRANSITIVE ID: 7] wireless communication circuitry
[FEATURE ID: 8] identification components, services, factorsfeatures, components, elements, devices, information, systems, data[FEATURE ID: 8] remote devices, circuitry, steps
[TRANSITIVE ID: 9] identifying, includingsuch, that, the, respective, and, different, corresponding[TRANSITIVE ID: 9] said, select
[FEATURE ID: 10] initial rating factorsinformation, feedback, inputs, data[FEATURE ID: 10] access
[FEATURE ID: 11] locationmessage, key, password[FEATURE ID: 11] request
[FEATURE ID: 12] keystroke patternsaudio, video, image[FEATURE ID: 12] video monitor
[FEATURE ID: 13] accessdistribution, delivery, transmission, connection[FEATURE ID: 13] serial transmission
[FEATURE ID: 14] contentdata, information, software, images, packets, signals, frames[FEATURE ID: 14] video signals, cursor control data, video monitor data, converted signals
[FEATURE ID: 15] claimitem, statement, paragraph, embodiment, clause, figure, requirement[FEATURE ID: 15] claim
1 . A method [FEATURE ID: 1]

of providing [TRANSITIVE ID: 2]

identity verification [FEATURE ID: 3]

and management [FEATURE ID: 3]

for a social network system [FEATURE ID: 1]

, the method comprising [TRANSITIVE ID: 4]

: creating [TRANSITIVE ID: 5]

member account profiles for members [FEATURE ID: 6]

of the social network system using [TRANSITIVE ID: 7]

identification components [FEATURE ID: 8]

for identifying [TRANSITIVE ID: 9]

members ; generating an identity rating for each member using initial rating factors [FEATURE ID: 10]

including [TRANSITIVE ID: 9]

: number of identification components , quality of identification components , and presence of an in - person authentication ; determining [TRANSITIVE ID: 3]

member identity rating thresholds for identity rating - restricted services [FEATURE ID: 8]

; authenticating a member attempting to access one or more identity rating - restricted services over the social network system , wherein the authentication includes confirmation of a member - registered device , confirmation of a member - registered location [FEATURE ID: 11]

, confirmation of a member - registered biometric , and combinations thereof ; managing the member ' s identity rating in real - time , wherein the member ' s identity rating is altered in real - time by monitoring member identity rating [FEATURE ID: 3]

- altering factors [FEATURE ID: 8]

including keystroke patterns [FEATURE ID: 12]

and language analysis ; providing member - to - member restrictions [FEATURE ID: 6]

using the managed identity ratings , wherein access [FEATURE ID: 13]

to network [FEATURE ID: 1]

- based content [FEATURE ID: 14]

and member - to - member interactions [FEATURE ID: 3]

is restricted based on member identity ratings thresholds ; and blocking access to the social network system by unauthenticated members . 2 . The method of claim [FEATURE ID: 15]

1 . A system [FEATURE ID: 1]

for providing [TRANSITIVE ID: 2]

wireless monitoring [FEATURE ID: 3]

and control [FEATURE ID: 3]

of remote devices [FEATURE ID: 8]

, said [TRANSITIVE ID: 9]

system comprising [TRANSITIVE ID: 4]

: at least one integrated [TRANSITIVE ID: 2]

wireless KVM switch [FEATURE ID: 1]

; at least one user workstation [FEATURE ID: 1]

comprising a keyboard , video monitor [FEATURE ID: 12]

, and cursor control device , and wireless communication circuitry [FEATURE ID: 7]

which communicates with said at least one integrated wireless KVM switch via a wireless network ; a plurality of remote devices ; and a plurality of wireless transceivers coupled to at least one of said remote devices through a KVM port of the wireless transceiver [FEATURE ID: 1]

for receiving [TRANSITIVE ID: 5]

, compressing and converting video signals [FEATURE ID: 14]

from said remote devices and for transmitting said compressed and converted video signals to said at least one integrated wireless KVM switch via a said wireless network ; wherein said at least one integrated wireless KVM switch bi-directionally communicates with said plurality of wireless transceivers and said at least one user workstation ; and wherein said user workstation transmits keyboard and cursor control device data from said keyboard and cursor control device to said at least one integrated wireless KVM switch , and wherein the plurality of wireless transceivers receives keyboard and cursor control device packet data from the integrated wireless KVM switch and emulates keyboard and cursor control data [FEATURE ID: 14]

for serial transmission [FEATURE ID: 13]

to said plurality of remote devices through the KVM port . 2 . A system according to claim [FEATURE ID: 15]

1 , wherein said at least one user workstation includes circuitry [FEATURE ID: 8]

for displaying a menu of said plurality of remote devices on said video monitor . 3 . A system according to claim 2 , wherein said menu provides access [FEATURE ID: 10]

to and control of a select [FEATURE ID: 9]

one of said plurality of remote devices . 4 . A system according to claim 1 , wherein said wireless network is an 802.11 wireless network . 5 . A system according to claim 1 , wherein said wireless network is an ad - hoc wireless network . 6 . A system according to claim 1 , wherein said wireless network is an infrastructure wireless network . 7 . A system according to claim 1 , wherein said plurality of wireless transceivers are powered by said plurality of remote devices . 8 . A system for providing wireless monitoring and control of remote devices , said system comprising : at least one user workstation comprising a keyboard , video monitor , cursor control device , wireless communication circuitry and video conditioning circuitry [FEATURE ID: 1]

for decompressing video monitor data [FEATURE ID: 14]

; a plurality of remote devices ; and a plurality of wireless transceivers having a KVM port and video conditioning circuitry for compressing video monitor data coupled to at least one of said remote devices through the KVM port for receiving , compressing and converting video signals from said remote devices and for transmitting said converted signals [FEATURE ID: 14]

to said user workstation via a wireless network ; at least one integrated wireless KVM switch ; wherein said user workstation bi-directionally communicates with said plurality of wireless transceivers through said at least one integrated wireless KVM switch ; wherein said user workstation wirelessly transmits keyboard and cursor control device data packets from said keyboard and cursor control device to at least one of said wireless transceivers via said wireless network ; wherein said wireless transceivers generates emulated keyboard and cursor control device data based on the received keyboard and cursor control device data packets and serially transmits the emulated data to said plurality of remote devices through the KVM port and wherein said user workstation wirelessly receives video monitor data that has been compressed by said video conditioning circuit [FEATURE ID: 1]

for compressing video monitor data from at least one of said wireless transceivers via said wireless network . 9 . A system according to claim 8 , wherein said at least one user workstation includes circuitry for displaying a menu of said plurality of remote devices on said video monitor . 10 . A system according to claim 9 , wherein said menu provides access to and control of a select one of said plurality of remote devices . 11 . A system according to claim 8 , wherein said wireless network is an 802.11 wireless network . 12 . A system according to claim 8 , wherein said wireless network is an ad - hoc wireless network . 13 . A system according to claim 8 , wherein said wireless network is an infrastructure wireless network . 14 . A system according to claim 8 , wherein said plurality of wireless transceivers are powered by said plurality of remote devices . 15 . A method [FEATURE ID: 1]

for wireless monitoring and control of remote devices , said method comprising the steps [FEATURE ID: 8]

of : displaying a menu of available remote devices [FEATURE ID: 6]

at a user workstation ; requesting access to a select one of said available remote devices by clicking on a link corresponding to said select remote device ; transmitting a request [FEATURE ID: 11]








Targeted Patent:

Patent: US8850535B2
Filed: 2011-08-05
Issued: 2014-09-30
Patent Holder: (Original Assignee) Safefaces LLC     (Current Assignee) Street Spirit Ip LLC
Inventor(s): Jason J. Liberman, David Scott Trandal

Title: Methods and systems for identity verification in a social network using ratings

 
Cross Reference / Shared Meaning between the Lines
Charted Against:

Patent: US20100313243A1
Filed: 2005-12-08
Issued: 2010-12-09
Patent Holder: (Original Assignee) AT&T Intellectual Property II LP     (Current Assignee) AT&T Intellectual Property II LP
Inventor(s): Pradeep K. Bansal, Lee Begeja, Carroll W. Creswell, Jeffrey Farah, Benjamin J. Stern, Jay Wilpon

Title: Digital social network trust propagation

[FEATURE ID: 1] method, person authentication, biometric, member ', member identity rating, member restrictions, agent, law enforcement officesystem, member, network, person, user, device, server[FEATURE ID: 1] method, digital social network, first party, database accessible, medium, party, link browser
[TRANSITIVE ID: 2] providingnetwork, member, user, repository, registry, implementing, trusted[TRANSITIVE ID: 2] establishing, database, profile
[FEATURE ID: 3] identity verification, management, initial rating factors, presence, confirmation, combinations, identity ratings, access, network, member interactions, member identity ratings thresholdsauthentication, authorization, information, permission, credentials, security, membership[FEATURE ID: 3] trust data, indication, link browser data
[FEATURE ID: 4] social network systemparty, server, customer, user, person, computer, subscriber[FEATURE ID: 4] trust relationship, second party, user system, sub-network control parameter
[TRANSITIVE ID: 5] comprising, using, includingcontaining, having, of, by, involving, include, indicating[TRANSITIVE ID: 5] comprising
[TRANSITIVE ID: 6] creating, generating, determining, authenticatingestablishing, providing, identifying, maintaining, obtaining, updating, setting[TRANSITIVE ID: 6] propagating, receiving, requesting, modifying, retrieving
[FEATURE ID: 7] member account profiles, identity rating, quality, factors, contentcharacteristics, information, identity, data, contacts, attributes, parameters[FEATURE ID: 7] trust databases, parties, contact data
[FEATURE ID: 8] members, unauthenticated memberssubscribers, entities, individuals, customers, groups, nodes, agents[FEATURE ID: 8] other parties
[FEATURE ID: 9] identification componentsmetadata, media, indicia[FEATURE ID: 9] display data
[TRANSITIVE ID: 10] identifyingsaid, the, corresponding[TRANSITIVE ID: 10] requested
[FEATURE ID: 11] memberidentifier, profile, user[FEATURE ID: 11] communication data
[FEATURE ID: 12] numberlocation, presence, content[FEATURE ID: 12] communication medium
[FEATURE ID: 13] member identity rating thresholdsboundaries, parameters, criteria[FEATURE ID: 13] link level
[FEATURE ID: 14] servicesaccess, transactions, interactions[FEATURE ID: 14] communication
[FEATURE ID: 15] authenticationdetermination, response, identification[FEATURE ID: 15] trust propagation parameters
[FEATURE ID: 16] deviceprofile, network, member[FEATURE ID: 16] sub-network
[FEATURE ID: 17] location, keystroke patternstext, message, sms, video, voice, image, chat[FEATURE ID: 17] email, letter, facsimile, voicemail
[FEATURE ID: 18] claimclause, the claim, paragraph, embodiment, item, figure, formula[FEATURE ID: 18] claim
1 . A method [FEATURE ID: 1]

of providing [TRANSITIVE ID: 2]

identity verification [FEATURE ID: 3]

and management [FEATURE ID: 3]

for a social network system [FEATURE ID: 4]

, the method comprising [TRANSITIVE ID: 5]

: creating [TRANSITIVE ID: 6]

member account profiles [FEATURE ID: 7]

for members [FEATURE ID: 8]

of the social network system using [TRANSITIVE ID: 5]

identification components [FEATURE ID: 9]

for identifying [TRANSITIVE ID: 10]

members ; generating [TRANSITIVE ID: 6]

an identity rating [FEATURE ID: 7]

for each member [FEATURE ID: 11]

using initial rating factors [FEATURE ID: 3]

including [TRANSITIVE ID: 5]

: number [FEATURE ID: 12]

of identification components , quality [FEATURE ID: 7]

of identification components , and presence [FEATURE ID: 3]

of an in - person authentication [FEATURE ID: 1]

; determining [TRANSITIVE ID: 6]

member identity rating thresholds [FEATURE ID: 13]

for identity rating - restricted services [FEATURE ID: 14]

; authenticating [TRANSITIVE ID: 6]

a member attempting to access one or more identity rating - restricted services over the social network system , wherein the authentication [FEATURE ID: 15]

includes confirmation [FEATURE ID: 3]

of a member - registered device [FEATURE ID: 16]

, confirmation of a member - registered location [FEATURE ID: 17]

, confirmation of a member - registered biometric [FEATURE ID: 1]

, and combinations [FEATURE ID: 3]

thereof ; managing the member ' [FEATURE ID: 1]

s identity rating in real - time , wherein the member ' s identity rating is altered in real - time by monitoring member identity rating [FEATURE ID: 1]

- altering factors [FEATURE ID: 7]

including keystroke patterns [FEATURE ID: 17]

and language analysis ; providing member - to - member restrictions [FEATURE ID: 1]

using the managed identity ratings [FEATURE ID: 3]

, wherein access [FEATURE ID: 3]

to network [FEATURE ID: 3]

- based content [FEATURE ID: 7]

and member - to - member interactions [FEATURE ID: 3]

is restricted based on member identity ratings thresholds [FEATURE ID: 3]

; and blocking access to the social network system by unauthenticated members [FEATURE ID: 8]

. 2 . The method of claim [FEATURE ID: 18]

1 , wherein the creating of member account profiles includes in - person authentication by an authorized agent [FEATURE ID: 1]

. 3 . The method of claim 1 , wherein the authorized agent is a law enforcement office [FEATURE ID: 1]

1 . A method [FEATURE ID: 1]

for propagating [TRANSITIVE ID: 6]

trust data [FEATURE ID: 3]

in a digital social network [FEATURE ID: 1]

, comprising [TRANSITIVE ID: 5]

: receiving [TRANSITIVE ID: 6]

a request from a first party [FEATURE ID: 1]

for establishing [TRANSITIVE ID: 2]

a trust relationship [FEATURE ID: 4]

with a second party [FEATURE ID: 4]

; receiving indication [FEATURE ID: 3]

from second party of establishing the requested [TRANSITIVE ID: 10]

trust relationship ; and propagating trust data of the first and second parties to other parties [FEATURE ID: 8]

of the digital social network based on trust propagation parameters [FEATURE ID: 15]

. 2 . The method of claim [FEATURE ID: 18]

1 , further comprising : requesting [TRANSITIVE ID: 6]

trust data from the first and second parties if the trust data is not already available ; and modifying [TRANSITIVE ID: 6]

trust databases [FEATURE ID: 7]

of the first and second parties to enable communication [FEATURE ID: 14]

between the first and second parties based on the trust data . 3 . The method of claim 2 , further comprising : retrieving [TRANSITIVE ID: 6]

trust propagation parameters of a sub-network [FEATURE ID: 16]

of the first and second parties ; and modifying trust databases of one or more parties other than the first and second parties based on the trust propagation parameters of the sub-network to enable communication between the one or more parties [FEATURE ID: 7]

and the first and second parties . 4 . The method of claim 3 , further comprising : specifying a trust data propagation link level in the trust propagation parameters ; and modifying trust databases of only those parties that relate to either the first or the second party within the link level [FEATURE ID: 13]

specified in the trust propagation parameters . 5 . The method of claim 2 , further comprising : retrieving the trust data from one or more of : an end - user system [FEATURE ID: 4]

of the first party and / or an end - user system of the second party ; a database [FEATURE ID: 2]

of the digital social network ; and a secured database accessible [FEATURE ID: 1]

to the digital social network . 6 . The method of claim 1 , further comprising : retrieving contact data [FEATURE ID: 7]

from a profile [FEATURE ID: 2]

of the second party ; and contacting the second party based on the contact data indicating that the first party requested the trust relationship . 7 . The method of claim 6 , the communication data [FEATURE ID: 11]

indicating a preferred medium [FEATURE ID: 1]

for communicating with the second party that includes one or more of : email [FEATURE ID: 17]

; written letter [FEATURE ID: 17]

; facsimile [FEATURE ID: 17]

; communication medium [FEATURE ID: 12]

within the digital social network ; and voicemail [FEATURE ID: 17]

. 8 . The method of claim 1 , further comprising : providing link browser data [FEATURE ID: 3]

to a party [FEATURE ID: 1]

; and receiving the request from the party via a link browser [FEATURE ID: 1]

. 9 . The method of claim 8 , further comprising : sending display data [FEATURE ID: 9]

to the party that includes a list of other parties that are linked to parties other than the party up to a link level specified in a sub-network control parameter [FEATURE ID: 4]