×

Identity theft countermeasures

  • US 8,381,293 B2
  • Filed: 05/20/2011
  • Issued: 02/19/2013
  • Est. Priority Date: 04/29/2004
  • Status: Active Grant
First Claim
Patent Images

1. A method for computer security, the method being performed by one or more processors and comprising:

  • accessing a plurality of records to determine documents that have been accessed on a computer system of a user;

    determining, from accessing the plurality of records, that the computer system of the user has been compromised as a result of confidential information being communicated from the user'"'"'s computer system to an unauthorized user;

    determining what data has been compromised by analyzing one or more records from the plurality of records, wherein the data is associated with an account of the user, the account including at least one of a name of the account, account numbers, a password, or credit card data;

    determining a responsible institution that issued the account to the user based on the account associated with the data that has been compromised; and

    in response to determining the responsible institution, transmitting a report of the data that has been compromised to the responsible institution.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×