System and method for providing identity theft security
First Claim
1. A system for minimizing the risk of theft or disclosure of personally identifiable or other sensitive information on a computer network comprising:
- a scanning engine located on a computer or work station on the network to identify personally identifiable or other sensitive information on said computer or work station;
a user control console in communication with said scanning engine; and
a report engine in communication with said control console;
wherein said user control console provides a configuration profile to said scanning engine, monitors the scanning engine, receives a data log from said scanning engine, and provides remediation instructions to said scanning engine based on said data log.
5 Assignments
0 Petitions
Accused Products
Abstract
A system and method of providing identity theft security is provided. The system and method utilizes a computer program that identifies, locates, secures, and/or removes from computers, computer systems and/or computer networks personally identifying and/or other sensitive information in different data formats. The computer program utilizes a multi-tiered escalation model of searching/identifying sensitive information. The computer program of the instant invention utilizes a self-learning process for fine-tuning a level of scrutiny for identifying potentially sensitive information.
-
Citations
10 Claims
-
1. A system for minimizing the risk of theft or disclosure of personally identifiable or other sensitive information on a computer network comprising:
-
a scanning engine located on a computer or work station on the network to identify personally identifiable or other sensitive information on said computer or work station; a user control console in communication with said scanning engine; and a report engine in communication with said control console; wherein said user control console provides a configuration profile to said scanning engine, monitors the scanning engine, receives a data log from said scanning engine, and provides remediation instructions to said scanning engine based on said data log. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
Specification