Identity security architecture systems and methods
First Claim
Patent Images
1. A identity security system, the identity security system comprising:
- a non-transitory data storage configured to store computer executable instructions for an identity data analysis system;
a dark web data store configured to store compromised data related to users'"'"' personal identifying information (PII) and aggregated statistics calculated based on the compromised data;
a plurality of identity alerts data stores configured to store alerts sent to the users and metadata associated with the alerts;
an identity metrics data store configured to store depersonalized summary statistics; and
a hardware processor programmed to execute the computer executable instructions in the non-transitory data storage to cause the identity security system to;
receive an instruction to generate an alert comprising personalized metrics of a user, wherein the instruction comprises PII of the user;
query a dark web data store with the PII of the user to acquire information on security compromises related to the PII of the user;
query an identity alerts data store with geographic location information of the user to obtain report statistics associated with a geographic region of the user;
query an identity metrics database to obtain the depersonalized summary statistics, wherein the depersonalized summary statistics are generated based on a group of individuals whose PIIs overlaps at least with a portion of the user'"'"'s PII;
generate an alert which comprises information on security compromises related to the PII of the user, report statistics associated with a geographic region of the user, and the depersonalized summary statistics; and
deliver the alert to a client computing device via a network, wherein compromised PIIs are acquired from dark web sites using one or more automated data collection processes.
6 Assignments
0 Petitions
Accused Products
Abstract
Embodiments of various systems and methods described herein provide an identity security database analytics system which is configured to provide security alerts to a user. The security alerts can include for personalized metrics related to potential identity theft incidents. The personalized metrics can include user specific information on security breaches of the user'"'"'s personal information as well as depersonalized statistics generated based on information of other users having one or more similar characteristics of the user.
-
Citations
18 Claims
-
1. A identity security system, the identity security system comprising:
- a non-transitory data storage configured to store computer executable instructions for an identity data analysis system;
a dark web data store configured to store compromised data related to users'"'"' personal identifying information (PII) and aggregated statistics calculated based on the compromised data;
a plurality of identity alerts data stores configured to store alerts sent to the users and metadata associated with the alerts;
an identity metrics data store configured to store depersonalized summary statistics; and
a hardware processor programmed to execute the computer executable instructions in the non-transitory data storage to cause the identity security system to;
receive an instruction to generate an alert comprising personalized metrics of a user, wherein the instruction comprises PII of the user;
query a dark web data store with the PII of the user to acquire information on security compromises related to the PII of the user;
query an identity alerts data store with geographic location information of the user to obtain report statistics associated with a geographic region of the user;
query an identity metrics database to obtain the depersonalized summary statistics, wherein the depersonalized summary statistics are generated based on a group of individuals whose PIIs overlaps at least with a portion of the user'"'"'s PII;
generate an alert which comprises information on security compromises related to the PII of the user, report statistics associated with a geographic region of the user, and the depersonalized summary statistics; and
deliver the alert to a client computing device via a network, wherein compromised PIIs are acquired from dark web sites using one or more automated data collection processes. - View Dependent Claims (2, 3, 4, 5, 6)
- a non-transitory data storage configured to store computer executable instructions for an identity data analysis system;
-
7. A method for protecting identity security, the method comprising:
- receiving an instruction to generate an alert comprising personalized metrics of a user, wherein the instruction comprises PII of the user;
querying a dark web data store with the PII of the user to acquire information on security compromises related to the PII of the user;
querying an identity alerts data store with geographic location information of the user to obtain report statistics associated with a geographic region of the user;
querying an identity metrics database to obtain depersonalized summary statistics, wherein the depersonalized summary statistics are generated based on a group of individuals whose PIIs overlaps at least with a portion of the user'"'"'s PII;
generating an alert which comprises information on security compromises related to the PII of the user, report statistics associated with a geographic region of the user, and the depersonalized summary statistics; and
delivering the alert to a client computing device via a network, wherein compromised PIIs are acquired from dark web sites using one or more automated data collection processes. - View Dependent Claims (8, 9, 10, 11, 12)
- receiving an instruction to generate an alert comprising personalized metrics of a user, wherein the instruction comprises PII of the user;
-
13. Non-transitory computer readable medium storing computer executable instructions thereon, the computer executable instructions when executed cause an identity security system to:
- receive an instruction to generate an alert comprising personalized metrics of a user, wherein the instruction comprises PII of the user;
query a dark web data store with the PII of the user to acquire information on security compromises related to the PII of the user;
query an identity alerts data store with geographic location information of the user to obtain report statistics associated with a geographic region of the user;
query an identity metrics database to obtain depersonalized summary statistics, wherein the depersonalized summary statistics are generated based on a group of individuals whose PIIs overlaps at least with a portion of the user'"'"'s PII;
generate an alert which comprises information on security compromises related to the PII of the user, report statistics associated with a geographic region of the user, and the depersonalized summary statistics; and
deliver the alert to a client computing device via a network, wherein compromised PIIs are acquired from dark web sites using one or more automated data collection processes. - View Dependent Claims (14, 15, 16, 17, 18)
- receive an instruction to generate an alert comprising personalized metrics of a user, wherein the instruction comprises PII of the user;
Specification