System and methods for identifying compromised personally identifiable information on the internet
First Claim
Patent Images
1. A method comprising:
- generating, by a computer system, a search-engine query from identity-theft nomenclature;
querying, by the computer system, at least one search engine via the search-engine query;
crawling, by the computer system, at least one computer-network resource identified via the querying;
collecting, by the computer system, identity-theft information from the at least one computer-network resource;
processing, by the computer system, the identity-theft information for compromised personally-identifying information (PII); and
storing the comprised PII.
1 Assignment
0 Petitions
Accused Products
Abstract
In one embodiment, a method includes generating, by a computer system, a search-engine query from stored identity-theft nomenclature. The method also includes querying, by the computer system, at least one search engine via the search-engine query. Further, the method includes crawling, by the computer system, at least one computer-network resource identified via the querying. In addition, the method includes collecting, by the computer system, identity-theft information from the at least one computer-network resource. Additionally, the method includes processing, by the computer system, the identity-theft information for compromised personally-identifying information (PII).
1012 Citations
20 Claims
-
1. A method comprising:
-
generating, by a computer system, a search-engine query from identity-theft nomenclature; querying, by the computer system, at least one search engine via the search-engine query; crawling, by the computer system, at least one computer-network resource identified via the querying; collecting, by the computer system, identity-theft information from the at least one computer-network resource; processing, by the computer system, the identity-theft information for compromised personally-identifying information (PII); and storing the comprised PII. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A computer system comprising:
-
non-transitory computer readable medium for storing software instructions; and a hardware processor programmed to execute the software instructions to; generate a search-engine query from identity-theft nomenclature; query at least one search engine via the search-engine query; crawl at least one computer-network resource identified via the querying; collect identity-theft information from the at least one computer-network resource; process the identity-theft information for compromised personally-identifying information (PII); and store the comprised PII. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification