System and method for preventing identity theft or misuse by restricting access
First Claim
Patent Images
1. A computer implemented method of preventing wrongful use of information stored in a computer system of an enterprise, the method comprising:
- providing a computer system including a database comprising data files, wherein the data files contains restricting criteria comprising one or more of customer names, addresses, zip codes, contact information, dates of birth, social security numbers, and financial account numbers of one or more of bank accounts, credit card accounts, and debit card accounts, wherein multiple users are authorized by the enterprise to access the system;
selecting a key word string, by at least one or more computer processors, comprising an alphanumeric string including at least a portion of numeric data identifying a financial account comprising one or more of bank accounts, credit card accounts, and debit card accounts;
scanning, by the at least one or more computer processors, a plurality of files for instances of the key word string;
determining, by the at least one or more computer processors, for each of the plurality of files, a density of the selected key word string by dividing a number of occurrences of the key word string by a size of the respective one of file of the plurality of files;
calculating, by the at least one or more computer processors and based on the determined density, a check digit from the numeric data in the plurality of files that correspond to the key word string;
validating, by the at least one or more computer processors, the files by comparing the calculated check digit to the numeric data in the files that correspond to the key word string;
identifying, based on the results of the validation, special files by the at least one or more computer processors; and
restricting access to the identified special files by performing, by the at least one or more computer processors, at least one of the steps comprising;
(1) activating an alarm to indicate when unauthorized access to one or more of the special files is occurring or has occurred;
(2) password protecting one or more of the special files;
(3) controlling access to one or more of the identified special files based on one or more of user type, place of user access, user file authorization, and user privileges authorization;
(4) executing site specific commands wherein the site specific commands gather evidence of what actions an unauthorized user is undertaking or undertook without exposing one or more of the special files to the unauthorized user;
(5) granting at least one identifier to a file opening process for one or more of the special files and revoking the identifier when one or more of the special files are closed;
(6) preventing covert code from running in association with one or more of the special files by attaching at least one of a crypt checksum and a privilege mask to one or more of the special files; and
(7) encrypting one or more of the special files.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and method for network file filtering to prevent identity theft or misuse by restricting access to files likely to contain sensitive data is disclosed. The file filtering process includes scanning at least one data file for density of a selected pattern. Files identified as containing the selected pattern may be further analyzed to determine the likelihood of the presence of sensitive information. The process may also include restricting access to files that are identified as likely to contain sensitive information.
1330 Citations
18 Claims
-
1. A computer implemented method of preventing wrongful use of information stored in a computer system of an enterprise, the method comprising:
-
providing a computer system including a database comprising data files, wherein the data files contains restricting criteria comprising one or more of customer names, addresses, zip codes, contact information, dates of birth, social security numbers, and financial account numbers of one or more of bank accounts, credit card accounts, and debit card accounts, wherein multiple users are authorized by the enterprise to access the system; selecting a key word string, by at least one or more computer processors, comprising an alphanumeric string including at least a portion of numeric data identifying a financial account comprising one or more of bank accounts, credit card accounts, and debit card accounts; scanning, by the at least one or more computer processors, a plurality of files for instances of the key word string; determining, by the at least one or more computer processors, for each of the plurality of files, a density of the selected key word string by dividing a number of occurrences of the key word string by a size of the respective one of file of the plurality of files; calculating, by the at least one or more computer processors and based on the determined density, a check digit from the numeric data in the plurality of files that correspond to the key word string; validating, by the at least one or more computer processors, the files by comparing the calculated check digit to the numeric data in the files that correspond to the key word string;
identifying, based on the results of the validation, special files by the at least one or more computer processors; andrestricting access to the identified special files by performing, by the at least one or more computer processors, at least one of the steps comprising; (1) activating an alarm to indicate when unauthorized access to one or more of the special files is occurring or has occurred; (2) password protecting one or more of the special files; (3) controlling access to one or more of the identified special files based on one or more of user type, place of user access, user file authorization, and user privileges authorization; (4) executing site specific commands wherein the site specific commands gather evidence of what actions an unauthorized user is undertaking or undertook without exposing one or more of the special files to the unauthorized user; (5) granting at least one identifier to a file opening process for one or more of the special files and revoking the identifier when one or more of the special files are closed; (6) preventing covert code from running in association with one or more of the special files by attaching at least one of a crypt checksum and a privilege mask to one or more of the special files; and (7) encrypting one or more of the special files. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A computer implemented method of preventing wrongful use of information stored in a computer system of an enterprise, the method comprising:
-
providing a computer system including a database comprising data files, wherein the data files contain restricting criteria comprising one or more of customer names, addresses, zip codes, contact information, dates of birth, social security numbers, and financial account numbers of one or more of bank accounts, credit card accounts, and debit card accounts, wherein multiple users are authorized by the enterprise to access the system; selecting, by at least one or more computer processors a special pattern comprising;
a key word string comprising an alphanumeric string including at least a portion of the numeric data identifying a financial account comprising one or more of bank accounts, credit card accounts, and debit card accounts; and
a second string structured for identifying one or more of customer names, addresses, zip codes, contact information, dates of birth, and social security numbers;scanning, by the at least one or more computer processors, a plurality of files for instances of the key word string; determining, by the at least one or more computer processors, for each of the plurality of files, a density of the selected key word string by dividing a number of occurrences of the key word string by a size of the respective one of file of the plurality of files; calculating, by the at least one or more computer processors and based on the determined density, a check digit from the numeric data in the plurality of files that correspond to the key word string; validating, by the at least one or more computer processors, the files by comparing the calculated check digit to the numeric data in the determined files that correspond to one or both of the first keyword string and the second string; identifying, based on the results of the validation, special files, by the at least one or more computer processors; and restricting access to the identified special files by performing, by the at least one or more computer processors, at least one of the steps comprising; (1) activating an alarm to indicate when unauthorized access to one or more of the special files is occurring or has occurred; (2) password protecting one or more of the special files; (3) controlling access to one or more of the identified special files based on one or more of user type, place of user access, user file authorization, and user privileges authorization; (4) executing site specific commands wherein the site specific commands gather evidence of what actions an unauthorized user is undertaking or undertook without exposing one or more of the special files to the unauthorized user; (5) granting at least one identifier to a file opening process for one or more of the special files and revoking the identifier when one or more of the special files are closed; (6) preventing covert code from running in association with one or more of the special files by attaching at least one of a crypt checksum and a privilege mask to one or more of the special files; and (7) encrypting one or more of the special files. - View Dependent Claims (8, 9, 10)
-
-
11. A computer system for confidential information wherein multiple users are authorized to access the system, the system comprising:
-
a database comprising data files, wherein the data files contains restricting criteria comprising one or more of customer names, addresses, zip codes, contact information, dates of birth, social security numbers, and financial account numbers of one or more of bank accounts, credit card accounts, and debit card accounts; at least one computer processor; and a memory device storing computer executable instructions, when executed by the at least one computer processor, cause the at least one computer to perform the method comprising; selecting a key word string comprising an alphanumeric string including at least a portion of the numeric data identifying a financial account comprising one or more of bank accounts, credit card accounts, and debit card accounts; scanning a plurality of files for instances of the occurrence of the key word string; determining for each of the plurality of files, a density of the selected key word string by dividing a number of occurrences of the key word string by a size of the respective one of file of the plurality of files; calculating, based on the determined density, a check digit from the numeric data in the plurality of files that correspond to the keyword string; validating the files by comparing the calculated check digit to the numeric data in the determined files that correspond to the keyword string; and identifying, based on the results of the validation, special files; and restricting access to the identified special files by performing at least one of the steps comprising; (1) activating an alarm to indicate when unauthorized access to one or more of the special files is occurring or has occurred; (2) password protecting one or more of the special files; (3) controlling access to one or more of the identified special files based on one or more of user type, place of user access, user file authorization, user privileges authorization; (4) executing site specific commands wherein the site specific commands which gather evidence of what actions an unauthorized user is undertaking or undertook without exposing one or more of the special files to the unauthorized user; (5) granting at least one identifier to a file opening process for one or more of the special files and revoking the identifier when one or more of the special files are closed; (6) preventing covert code from running in association with one or more of the special files by attaching at least one of a crypt checksum and a privilege mask to one or more of the special files; and (7) encrypting one or more of the special files. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18)
-
Specification