×

Data security seeding system

  • US 8,213,589 B1
  • Filed: 12/15/2011
  • Issued: 07/03/2012
  • Est. Priority Date: 12/15/2011
  • Status: Expired due to Fees
First Claim
Patent Images

1. A monitoring security system for tracking seed data comprising:

  • seed data for insertion into a secured private information database listing, wherein the seed data includes the following information data strings, a fictitious name having both a first and last name portion, an email address associated with the fictitious name for receiving email communications and a phone number created to match to and assigned with the fictitious name for receiving telephone and/or fax communications;

    a network;

    a computer connected to the network and configured to monitor incoming communications to the network;

    a database connected to the computer, the database configured to store a record of the seed data and a pre-recorded voice message corresponding to the phone number defined by the seed data;

    the computer, upon receiving a notice of an incoming phone call placed to the phone number corresponding to the seed data, having software configured to playback to an intended recipient of the incoming phone call, the pre-recorded voice message and further configured to store a caller identification phone number and/or record a caller voice message from the incoming phone call;

    the software being further configured to forward the caller identification phone number and/or recorded caller voice message from the incoming phone call to a user for a determination of whether the incoming phone call was conducted by breaching the secured private information database listing; and

    the software, upon receiving a notice of an incoming communication from a third party to the seed data, is further configured to store third party identification information associated with the incoming communication and/or a copy of the incoming communication and the software is further configured to forward the third party identification information and/or the copy of the incoming communication to the database and/or to the user for determining whether the incoming communication was conducted by breaching the secured private information database listing.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×