IDENTITY THEFT COUNTERMEASURES
First Claim
Patent Images
1. A method for computer security, the method being implemented by a combination of processors that perform steps comprising:
- receiving a report that is generated in response to a user inquiry as whether a possible compromise of information on a user'"'"'s computer system;
accessing a record index that includes a plurality of records that collectively represent a history of documents that have been accessed using the user'"'"'s computer system over a record;
determining one or more records from the record index that are of a pre-determined type to be suspicious; and
initiating analysis of the one or more records.
1 Assignment
0 Petitions
Accused Products
Abstract
In some embodiments, techniques for computer security comprise preventing and/or mitigating identity theft such as phishing.
-
Citations
1 Claim
-
1. A method for computer security, the method being implemented by a combination of processors that perform steps comprising:
-
receiving a report that is generated in response to a user inquiry as whether a possible compromise of information on a user'"'"'s computer system; accessing a record index that includes a plurality of records that collectively represent a history of documents that have been accessed using the user'"'"'s computer system over a record; determining one or more records from the record index that are of a pre-determined type to be suspicious; and initiating analysis of the one or more records.
-
Specification