SYSTEM AND METHODS FOR AN IDENTITY THEFT PROTECTION BOT
First Claim
1. A system to locate and deny theft of personal information in a computer network, the system comprising:
- a. a search engine bot arranged to scan and write to memory existing or newly uncovered locations where personal data are being traded in the computer network;
b. a conversation bot interactive with the search engine and arranged to solicit a transaction of stolen personal information through a natural language human conversation enticement; and
c. a notification bot interactive with the search engine to provide notification of the existence of a stolen personal information provider discovered through the conversation bot.
1 Assignment
0 Petitions
Accused Products
Abstract
The present invention relates to an information security bot system for the mitigation of damage upon its victims, or enforcement of Identity Theft laws, by searching and inducing transactions with perpetrators of identity crimes (e.g. identity theft.). Searching is accomplished using a software spider search robot (“bot”) that turns any transmitted personal information in to a bit-keyed array that cannot betray any of the known information of the users. Transactions with perpetrators are induced and affected using machine generated natural language techniques. In instances of success, data (actual, bogus or “poisoned”) is transferred to or received from said perpetrators. This data can be used to protect victims or to ensnare perpetrators. In addition, the invention relates to offensive and proactive prevention of identity theft and other related crimes.
-
Citations
17 Claims
-
1. A system to locate and deny theft of personal information in a computer network, the system comprising:
-
a. a search engine bot arranged to scan and write to memory existing or newly uncovered locations where personal data are being traded in the computer network;
b. a conversation bot interactive with the search engine and arranged to solicit a transaction of stolen personal information through a natural language human conversation enticement; and
c. a notification bot interactive with the search engine to provide notification of the existence of a stolen personal information provider discovered through the conversation bot. - View Dependent Claims (2, 3, 4, 5, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
6. The system as claimed in claim further comprising means for recording new venues, terminology and text parsing techniques to overcome new communication types and increasing sophistication of personal information gathering mechanisms.
Specification