SYSTEM AND METHOD FOR PROVIDING IDENTITY THEFT SECURITY
First Claim
1. A method of minimizing the risk of theft or disclosure of personally identifiable or other sensitive information comprising the steps of:
- identifying data from a data source that may contain sensitive information in a first stage of a search mechanism, said first stage broadly identifying as potentially sensitive any data from said data source that exhibits any attributes relating to sensitive information;
escalating said potentially sensitive data to at least a second more sensitive stage of said search mechanism, said second stage including the step of scoring said potentially sensitive data scale based on minimal information entropy;
evaluating for possible remediation any potentially sensitive data that includes a score beyond a predetermined threshold, said evaluating step utilizing a rule table to determine whether remediation is necessary; and
remediating potentially sensitive data in which remediation is determined to be necessary in said evaluating step.
5 Assignments
0 Petitions
Accused Products
Abstract
A system and method of providing identity theft security is provided. The system and method utilizes a computer program that identifies, locates, secures, and/or removes from computers, computer systems and/or computer networks personally identifying and/or other sensitive information in different data formats. The computer program utilizes a multi-tiered escalation model of searching/identifying sensitive information. The computer program of the instant invention utilizes a self-learning process for fine-tuning a level of scrutiny for identifying potentially sensitive information.
124 Citations
31 Claims
-
1. A method of minimizing the risk of theft or disclosure of personally identifiable or other sensitive information comprising the steps of:
-
identifying data from a data source that may contain sensitive information in a first stage of a search mechanism, said first stage broadly identifying as potentially sensitive any data from said data source that exhibits any attributes relating to sensitive information; escalating said potentially sensitive data to at least a second more sensitive stage of said search mechanism, said second stage including the step of scoring said potentially sensitive data scale based on minimal information entropy; evaluating for possible remediation any potentially sensitive data that includes a score beyond a predetermined threshold, said evaluating step utilizing a rule table to determine whether remediation is necessary; and remediating potentially sensitive data in which remediation is determined to be necessary in said evaluating step. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21)
-
-
22. A system for minimizing the risk of theft or disclosure of personally identifiable or other sensitive information on a computer network comprising:
-
a scanning engine located on a computer or work station on the network to identify personally identifiable or other sensitive information on said computer or work station; a user control console in communication with said scanning engine; and a report engine in communication with said control console; wherein said user control console provides a configuration profile to said scanning engine, monitors the scanning engine, receives a data log from said scanning engine, and provides remediation instructions to said scanning engine. - View Dependent Claims (23, 24, 25, 26, 27, 28, 29, 30, 31)
-
Specification