Apparatus and method for identifying and warning of synthetic identity behavior that reduces user privacy
First Claim
1. A non-transitory computer readable storage medium with instructions executed by a processor to:
- collect mobile device environment parameters;
store identity attributes including real identity attributes for a real individual and at least two sets of synthetic identity attributes each operative as a personal privacy proxy preventing access to the real identity attributes, wherein the at least two sets of synthetic identity attributes each include a synthetic identity name, a synthetic identity phone number and a synthetic identity email address;
monitor an electronic communication attempt by a designated entity corresponding to a selected synthetic identity that is displayed to the designated entity in a user interface;
analyze the electronic communication attempt in connection with the mobile device environment parameter and identity attributes to identify a rule transgression risking the privacy of the real identity attributes, wherein the rule transgression is the utilization of a real identity attribute of the real identity attributes for the real individual instead of a synthetic identity attribute of the selected synthetic identity, wherein the designated entity manually enters the real identity attributes in the user interface; and
supply a warning in real time in connection with the electronic communication attempt indicating the rule transgression.
1 Assignment
0 Petitions
Accused Products
Abstract
A non-transitory computer readable storage medium has instructions executed by a processor to collect mobile device environment parameters. Identity attributes including real identity attributes for a real individual and at least one set of synthetic identity attributes are stored. An electronic communication attempt by a designated entity corresponding to either the real identity attributes or the at least one set of synthetic identity attributes is monitored. The electronic communication attempt is analyzed in connection with the mobile device environment parameters and identity attributes to identify a rule transgression. A warning is supplied in connection with the electronic communication attempt in response to the rule transgression.
19 Citations
8 Claims
-
1. A non-transitory computer readable storage medium with instructions executed by a processor to:
-
collect mobile device environment parameters; store identity attributes including real identity attributes for a real individual and at least two sets of synthetic identity attributes each operative as a personal privacy proxy preventing access to the real identity attributes, wherein the at least two sets of synthetic identity attributes each include a synthetic identity name, a synthetic identity phone number and a synthetic identity email address; monitor an electronic communication attempt by a designated entity corresponding to a selected synthetic identity that is displayed to the designated entity in a user interface; analyze the electronic communication attempt in connection with the mobile device environment parameter and identity attributes to identify a rule transgression risking the privacy of the real identity attributes, wherein the rule transgression is the utilization of a real identity attribute of the real identity attributes for the real individual instead of a synthetic identity attribute of the selected synthetic identity, wherein the designated entity manually enters the real identity attributes in the user interface; and supply a warning in real time in connection with the electronic communication attempt indicating the rule transgression. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
Specification