Systems and methods of identity protection and management
First Claim
1. A method of efficiently protecting against electronic threats, the method being performed by a system of one or more computer processors, the method comprising:
- receiving a request, by the system, from a user to monitor personal information stored by different online server providers;
periodically accessing information indicative of the personal information stored by the online service providers, and indicating whether changes or attempted changes were made to the personal information;
triggering, by the system and based on the periodic access, an event for processing, the event identifying a detected change or attempted change, and the event causing determination of one or more of a risk level associated with the detected change or protective actions to be applied to at least one user account; and
notifying, by the system, the user regarding the detected change or attempted change.
1 Assignment
0 Petitions
Accused Products
Abstract
In an embodiment, a computing system, such as a monitoring computer, receives a request from a user to monitor an account of the user with an online service provider. The request may include personal information and user preferences for one or more protective actions. The system periodically monitors external data sources for indications of changes to personal information associated with the account, and detects changes or attempted changes to personal information associated with the account. The system may determine risk levels associated with detected changes or attempted changes, and transmit a notification to the user via a communication channel selected based on the determined risk level and/or the user preferences. The system may also initiate protective actions, so that further unauthorized access to the account may be prevented.
2041 Citations
20 Claims
-
1. A method of efficiently protecting against electronic threats, the method being performed by a system of one or more computer processors, the method comprising:
-
receiving a request, by the system, from a user to monitor personal information stored by different online server providers; periodically accessing information indicative of the personal information stored by the online service providers, and indicating whether changes or attempted changes were made to the personal information; triggering, by the system and based on the periodic access, an event for processing, the event identifying a detected change or attempted change, and the event causing determination of one or more of a risk level associated with the detected change or protective actions to be applied to at least one user account; and notifying, by the system, the user regarding the detected change or attempted change. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A system comprising one or more processors and non-transitory computer storage media storing instructions that, when executed by the processors, cause the processors to perform operations comprising:
-
receiving a request from a user to monitor personal information stored by different online server providers; periodically accessing information indicative of the personal information stored by the online service providers, and indicating whether changes or attempted changes were made to the personal information; triggering, based on the periodic access, an event for processing, the event identifying a detected change or attempted change to personal information, and the event causing determination of one or more of a risk level associated with the detected change or protective actions to be applied to at least one user account; and notifying, by the system, the user regarding the detected change or attempted change. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. Non-transitory computer storage media storing instructions that, when executed by a system of one or more computers, cause the system to perform operations comprising:
-
receiving a request from a user to monitor personal information stored by different online server providers; periodically accessing information indicative of the personal information stored by the online service providers, and indicating whether changes or attempted changes were made to the personal information; triggering, based on the periodic access, an event for processing, the event identifying a detected change or attempted change to personal information, and the event causing determination of one or more of a risk level associated with the detected change or protective actions to be applied to at least one user account; and notifying, by the system, the user regarding the detected change or attempted change. - View Dependent Claims (20)
-
Specification