Method and system for protecting user identification information
First Claim
Patent Images
1. A method for protecting identity information comprising:
- determining, via at least one computer processor, identity information required by a resource utilized by a user amongst a plurality of resources utilized by the user, wherein the at least one computer processor is separate from the resource utilized by the user, wherein the plurality of resources comprise a plurality of websites, and wherein the identity information comprises at least one of a user name or a password;
determining a strength of the identity information used by the user to access the resource by tracking a plurality of resources accessed by the user and determining the strength as weak if the identity information is common between the plurality of resources accessed by the user or if the identity information is derived from a user'"'"'s personal information, wherein access is achieved via a provision of identity information by the user to the resource to be accessed; and
performing an action in view of the strength, wherein performing an action comprises one or more of preventing the user from providing the identity information to the resource utilized by the user, identifying a stored user preference, notifying the user, generating new identity information for the user, providing new identity information to the user, prompting the user to generate new identity information, performing a change of identity information at the resource utilized by the user, receiving an alert from a subscription service;
wherein determining the identity information is initiated by one or more of;
the user, according to a predetermined time schedule, in response to a subscription invoked message, and in response to an identity threat alert.
5 Assignments
0 Petitions
Accused Products
Abstract
A method and system for protecting identity information comprises determining identity information required by a resource utilized by a user, determining strength of the identity information used by the user to access the resource, and performing an action in view of the strength.
75 Citations
20 Claims
-
1. A method for protecting identity information comprising:
-
determining, via at least one computer processor, identity information required by a resource utilized by a user amongst a plurality of resources utilized by the user, wherein the at least one computer processor is separate from the resource utilized by the user, wherein the plurality of resources comprise a plurality of websites, and wherein the identity information comprises at least one of a user name or a password; determining a strength of the identity information used by the user to access the resource by tracking a plurality of resources accessed by the user and determining the strength as weak if the identity information is common between the plurality of resources accessed by the user or if the identity information is derived from a user'"'"'s personal information, wherein access is achieved via a provision of identity information by the user to the resource to be accessed; and performing an action in view of the strength, wherein performing an action comprises one or more of preventing the user from providing the identity information to the resource utilized by the user, identifying a stored user preference, notifying the user, generating new identity information for the user, providing new identity information to the user, prompting the user to generate new identity information, performing a change of identity information at the resource utilized by the user, receiving an alert from a subscription service; wherein determining the identity information is initiated by one or more of;
the user, according to a predetermined time schedule, in response to a subscription invoked message, and in response to an identity threat alert. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system for protecting identity information, the system comprising:
-
an information determining entity including instructions for determining, via at least one computer hardware processor, identity information required by a resource utilized by a user amongst a plurality of resources utilized by the user, wherein the at least one computer hardware processor is separate from the resource utilized by the user, wherein the plurality of resources comprise a plurality of websites, and wherein the identity information comprises at least one of a user name or a password; a strength determining entity including instructions for determining the strength of the identity information used by the user to access the resource by tracking a plurality of resources accessed by the user and determining the strength as weak if the identity information is common between the plurality of resources accessed by the user or if the identity information is derived from a user'"'"'s personal information, wherein access is achieved via a provision of identity information by the user to the resource to be accessed; and an action performing entity including instructions for performing an action in view of the strength, wherein performing an action comprises one or more of preventing the user from providing the identity information to the resource utilized by the user, identifying a stored user preference, notifying the user, generating new identity information for the user, providing new identity information to the user, prompting the user to generate new identity information, performing a change of identity information at the resource utilized by the user, receiving an alert from a subscription service; wherein determining the identity information is initiated by one or more of;
the user, according to a predetermined time schedule, in response to a subscription invoked message, and in response to an identity threat alert. - View Dependent Claims (12, 13, 14, 15)
-
-
16. A non-transitory computer-readable storage medium comprising:
-
instructions executable by at least one computer processor to cause the at least one computer processor to; determine identity information required by a resource utilized by a user amongst a plurality of resources utilized by the user, wherein the at least one computer processor is separate from the resource utilized by the user, wherein the plurality of resources comprise a plurality of websites, and wherein the identity information comprises at least one of a user name or a password; determine a strength of the identity information used by the user to access the resource by tracking a plurality of resources accessed by the user and determining the strength as weak if the identity information is common between the plurality of resources accessed by the user or if the identity information is derived from a user'"'"'s personal information, wherein access is achieved via a provision of identity information by the user to the resource to be accessed; and perform an action in view of the strength, wherein performing an action comprises one or more of preventing the user from providing the identity information to the resource utilized by the user, identifying a stored user preference, notifying the user, generating new identity information for the user, providing new identity information to the user, prompting the user to generate new identity information, performing a change of identity information at the resource utilized by the user, receiving an alert from a subscription service; wherein determining the identity information is initiated by one or more of;
the user, according to a predetermined time schedule, in response to a subscription invoked message, and in response to an identity threat alert. - View Dependent Claims (17, 18, 19, 20)
-
Specification