SYSTEM AND METHOD FOR PROVIDING IDENTITY THEFT SECURITY
First Claim
1. A method of minimizing the risk of theft or disclosure of personally identifiable or sensitive information comprising the steps of:
- identifying data that may contain sensitive information; and
using an information retrieval tool from the group consisting of Vector Space Models, Latent Semantic Analysis, Latent Dirichlet Allocation and Bayesian Networks to compare attributes of said data to attributes of similar concept data files.
5 Assignments
0 Petitions
Accused Products
Abstract
A system and method of providing identity theft security is provided. The system and method utilizes a computer program that identifies, locates, secures, and/or removes from computers, computer systems and/or computer networks personally identifying and/or other sensitive information in different data formats. The computer program utilizes a multi-tiered escalation model of searching/identifying sensitive information. The computer program of the instant invention utilizes a self-learning process for fine-tuning a level of scrutiny for identifying potentially sensitive information.
125 Citations
20 Claims
-
1. A method of minimizing the risk of theft or disclosure of personally identifiable or sensitive information comprising the steps of:
-
identifying data that may contain sensitive information; and using an information retrieval tool from the group consisting of Vector Space Models, Latent Semantic Analysis, Latent Dirichlet Allocation and Bayesian Networks to compare attributes of said data to attributes of similar concept data files. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A system for minimizing the risk of theft or disclosure of personally identifiable or sensitive information on a computer network comprising:
-
a scanning engine located on a computer or work station on the network to identify personally identifiable or sensitive information on said computer or work station; a user control console in communication with said scanning engine; and a report engine in communication with said control console. - View Dependent Claims (13, 14, 15, 16)
-
-
17. A method of self-learning for a system for minimizing the risk of theft or disclosure of personally identifiable or sensitive information, said method comprising the steps of:
-
setting the system to a relatively high level of scrutiny to identify data files that may contain sensitive information, wherein certain of said files are falsely identified as containing sensitive information; obtaining a corpus of concept data files that have been identified by the system as containing sensitive information; determining files that are falsely identified as containing sensitive information; creating a matrix of attributes for clean concept data files within said corpus based upon said falsely identified files; and creating a matrix of attributes for target concept data files within said corpus based upon files that have not been falsely identified.
-
-
18. A method of minimizing the risk of theft or disclosure of personally identifiable or sensitive information comprising the steps of:
-
identifying data that may contain sensitive information; placing said data in a data log wherein the potentially sensitive information is separated from said data; and including contextual information for said potentially sensitive information in said data log, wherein said contextual information is separated from said data. - View Dependent Claims (19)
-
-
20. A method of minimizing the risk of theft or disclosure of personally identifiable or sensitive information comprising the steps of:
-
utilizing pattern matching via regular expressions to identify possible personally identifiable or sensitive information in a first stage; and escalating said possible personally identifiable or sensitive information to at least a second more sensitive stage for additional analysis.
-
Specification