Data security seeding system
First Claim
Patent Images
1. A monitoring security system for tracking seed data comprising:
- seed data for insertion into a secured private information database listing, wherein the seed data includes the following information data strings, a fictitious name having both a first and last name portion, an email address associated with the fictitious name for receiving email communications and a phone number created to match to and assigned with the fictitious name for receiving telephone and/or fax communications;
a network;
a computer connected to the network and configured to monitor incoming communications to the network;
a database connected to the computer, the database configured to store a record of the seed data and a pre-recorded voice message corresponding to the phone number defined by the seed data;
the computer, upon receiving a notice of an incoming phone call placed to the phone number corresponding to the seed data, having software configured to playback to an intended recipient of the incoming phone call, the pre-recorded voice message and further configured to store a caller identification phone number and/or record a caller voice message from the incoming phone call;
the software being further configured to forward the caller identification phone number and/or recorded caller voice message from the incoming phone call to a user for a determination of whether the incoming phone call was conducted by breaching the secured private information database listing; and
the software, upon receiving a notice of an incoming communication from a third party to the seed data, is further configured to store third party identification information associated with the incoming communication and/or a copy of the incoming communication and the software is further configured to forward the third party identification information and/or the copy of the incoming communication to the database and/or to the user for determining whether the incoming communication was conducted by breaching the secured private information database listing.
2 Assignments
0 Petitions
Accused Products
Abstract
In one aspect of the invention there is provided a system for tracking seed data that has been inserted into a secured private information database listing. The system includes a network, computer, and database. Incoming communications to the network are monitored and when matched to a phone number corresponding to the seed data, the system plays back a pre-recorded voice message and stores a caller identification phone number and/or records a caller voice message from the incoming phone call. The information is sent to a user to determine if the incoming phone call was conducted by breaching the secured private information database listing.
10 Citations
11 Claims
-
1. A monitoring security system for tracking seed data comprising:
-
seed data for insertion into a secured private information database listing, wherein the seed data includes the following information data strings, a fictitious name having both a first and last name portion, an email address associated with the fictitious name for receiving email communications and a phone number created to match to and assigned with the fictitious name for receiving telephone and/or fax communications; a network; a computer connected to the network and configured to monitor incoming communications to the network; a database connected to the computer, the database configured to store a record of the seed data and a pre-recorded voice message corresponding to the phone number defined by the seed data; the computer, upon receiving a notice of an incoming phone call placed to the phone number corresponding to the seed data, having software configured to playback to an intended recipient of the incoming phone call, the pre-recorded voice message and further configured to store a caller identification phone number and/or record a caller voice message from the incoming phone call; the software being further configured to forward the caller identification phone number and/or recorded caller voice message from the incoming phone call to a user for a determination of whether the incoming phone call was conducted by breaching the secured private information database listing; and the software, upon receiving a notice of an incoming communication from a third party to the seed data, is further configured to store third party identification information associated with the incoming communication and/or a copy of the incoming communication and the software is further configured to forward the third party identification information and/or the copy of the incoming communication to the database and/or to the user for determining whether the incoming communication was conducted by breaching the secured private information database listing. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method for a security monitoring system of tracking fictitious seed data against theft of a secured private information database listing containing the fictitious seed data, the method comprising:
-
creating seed data for insertion into a secured private information database listing, wherein the seed data includes the following information data strings, a fictitious name having both a first and last name portion, an email address associated with the fictitious name for receiving email communications and a phone number created to match to and assigned with the fictitious name for receiving telephone and/or fax communications; providing a computer connected to a network, wherein the computer is connected to a database; storing a record of the seed data on said database and storing a pre-recorded voice message corresponding to the phone number defined by the seed data on said database; monitoring incoming communications to the network; wherein upon receiving a notice of an incoming phone call placed to the phone number corresponding to the seed data, playing back to a recipient of the incoming phone call the pre-recorded voice message and storing a caller identification phone number and/or recording a caller voice message from the incoming phone call; forwarding the caller identification phone number and/or recorded caller voice message from the incoming phone call to the database and/or to a user for determining whether the incoming phone call was conducted by breaching the secured private information database listing; and the computer, upon receiving a notice of an incoming communication from a third party to the seed data, has software configured to further store third party identification information associated with the incoming communication and/or a copy of the incoming communication and the computer further has software configured to forward the third party identification information and/or the copy of the incoming communication to the database and to the user for determining whether the incoming communication was conducted by breaching the secured private information database listing. - View Dependent Claims (8)
-
-
9. A method for a security monitoring system of tracking fictitious seed data against theft of a secured private information database listing containing the fictitious seed data, the method comprising:
-
creating seed data for insertion into a secured private information database listing, wherein the seed data includes the following information data strings, a fictitious name having both a first and last name portion, a real email address associated with the fictitious name and a real phone number created to match to and assigned with the fictitious name; providing a computer connected to a network, wherein the computer is connected to a database and the database is configured to store a record of the seed data and to store a pre-recorded voice message corresponding to the phone number defined by the seed data; monitoring incoming communications to the network; wherein upon receiving a notice of an incoming phone call placed to the phone number corresponding to the seed data, playing back to a recipient of the incoming phone call the pre-recorded voice message and storing caller identification information; wherein upon receiving a notice of another type of incoming communication from a third party and sent to the send data storing third party identification information, wherein the incoming communication includes one or more of a text message, an instant message, a short message service message, an enhanced messaging service message, a multimedia messaging service message, a photo, a video clip, a fax message, or an internet relay chat message; and forwarding the third party identification information to a user for determining whether the incoming communication was conducted by breaching the secured private information database listing. - View Dependent Claims (10, 11)
-
Specification