Identity theft countermeasures
First Claim
Patent Images
1. A method for computer security, the method being performed by one or more processors and comprising:
- accessing a plurality of records to determine documents that have been accessed on a computer system of a user;
determining, from accessing the plurality of records, that the computer system of the user has been compromised as a result of confidential information being communicated from the user'"'"'s computer system to an unauthorized user;
determining what data has been compromised by analyzing one or more records from the plurality of records, wherein the data is associated with an account of the user, the account including at least one of a name of the account, account numbers, a password, or credit card data;
determining a responsible institution that issued the account to the user based on the account associated with the data that has been compromised; and
in response to determining the responsible institution, transmitting a report of the data that has been compromised to the responsible institution.
1 Assignment
0 Petitions
Accused Products
Abstract
In some embodiments, techniques for computer security comprise preventing and/or mitigating identity theft such as phishing.
-
Citations
15 Claims
-
1. A method for computer security, the method being performed by one or more processors and comprising:
-
accessing a plurality of records to determine documents that have been accessed on a computer system of a user; determining, from accessing the plurality of records, that the computer system of the user has been compromised as a result of confidential information being communicated from the user'"'"'s computer system to an unauthorized user; determining what data has been compromised by analyzing one or more records from the plurality of records, wherein the data is associated with an account of the user, the account including at least one of a name of the account, account numbers, a password, or credit card data; determining a responsible institution that issued the account to the user based on the account associated with the data that has been compromised; and in response to determining the responsible institution, transmitting a report of the data that has been compromised to the responsible institution. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A system for providing computer security comprising:
-
one or more memory resources; and one or more processors coupled to the one or more memory resources, the one or more processors configured to; access a plurality of records to determine documents that have been accessed on a computer system of a user; determine, from accessing the plurality of records, that the computer system of the user has been compromised as a result of confidential information being communicated from the user'"'"'s computer system to an unauthorized user; determine what data has been compromised by analyzing one or more records from the plurality of records, wherein the data is associated with an account of the user, the account including at least one of a name of the account, account numbers, a password, or credit card data; determine a responsible institution that issued the account to the user based on the account associated with the data that has been compromised; and in response to determining the responsible institution, transmit a report of the data that has been compromised to the responsible institution. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A non-transitory computer readable medium storing instructions that, when executed by one or more processors, cause the one or more processors to perform steps comprising:
-
accessing a plurality of records to determine documents that have been accessed on a computer system of a user; determining, from accessing the plurality of records, that the computer system of the user has been compromised as a result of confidential information being communicated from the user'"'"'s computer system to an unauthorized user; determining what data has been compromised by analyzing one or more records from the plurality of records, wherein the data is associated with an account of the user, the account including at least one of a name of the account, account numbers, a password, or credit card data; determining a responsible institution that issued the account to the user based on the account associated with the data that has been compromised; and in response to determining the responsible institution, transmitting a report of the data that has been compromised to the responsible institution. - View Dependent Claims (12, 13, 14, 15)
-
Specification