×

System and method for preventing identity theft or misuse by restricting access

  • US 8,849,716 B1
  • Filed: 09/14/2007
  • Issued: 09/30/2014
  • Est. Priority Date: 04/20/2001
  • Status: Active Grant
First Claim
Patent Images

1. A computer implemented method of preventing identity theft and other wrongful use of information stored in a computer system of an enterprise engaged in recording financial and other confidential information, the method comprising:

  • (a) providing a computer system including a database comprising non-sensitive and sensitive data files, wherein the sensitive data files comprise sensitive information comprising one or more of customer names, addresses, zip codes, contact information, dates of birth, social security numbers, and financial account numbers of one or more of bank accounts, credit card accounts, and debit card accounts, wherein further multiple users are authorized by the enterprise to access the system;

    (b) selecting a key word string, by at least one or more computer processors, comprising an alphanumeric string including at least a portion of numeric data identifying a financial account comprising one or more of bank accounts, credit card accounts, and debit card accounts;

    (c) scanning, by the at least one or more computer processors, the database for files comprising the key word string;

    (d) determining, by the at least one or more computer processors, whether a density of occurrence of the key word string in files that comprise the key word string is greater than a threshold density;

    (e) calculating, by the at least one or more computer processors, a check digit from the numeric data in the determined files that correspond to the key word string;

    (f) validating, by the at least one or more computer processors, the files by comparing the calculated check digit to the numeric data in the files that correspond to the key word string;

    (g) based on the results of the validation, identifying special files by the at least one or more computer processors,(h) protecting the special files by moving the identified special files to a secure location, by the at least one or more computer processors;

    (i) receiving, by the at least one or more computer processors, a request to access at least one of the identified special files, and(j) in response to receiving the access request, performing, by the at least one or more computer processors, at least one of the steps comprising;

    (1) activating an alarm to indicate when unauthorized access to one or more of the special files is occurring or has occurred;

    (2) password protecting one or more of the special files;

    (3) controlling access based on one or more of user type, place of user access, user file authorization, and user privileges authorization;

    (4) executing site specific commands wherein the site specific commands gather evidence of what actions an unauthorized user is undertaking or undertook without exposing one or more of the special files to the unauthorized user;

    (5) granting at least one identifier to a file opening process for one or more of the special files and revoking the identifier when one or more of the special files are closed;

    (6) preventing covert code from running in association with one or more of the special files by attaching at least one of a crypt checksum and a privilege mask to one or more of the special files; and

    (7) encrypting one or more of the special files.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×