Identity and reputation monitoring
First Claim
Patent Images
1. A method of monitoring for potential misuses of identity information comprising:
- creating, at a monitoring system, an electronic profile comprising first identity information of a user;
receiving, at the monitoring system, from a third party website;
a first indication that at least a portion of the first identity information has been used to successfully log into an account of the user that is maintained by the third party website; and
a second indication that a request to alter second identity information of the user stored by the third party website has been initiated while the account was successfully logged into;
evaluating whether the use of the first identity information is a potential misuse based on a match analysis of information from the electronic profile of the user created at the monitoring system, the first indication from the third party website that at least a portion of the first identity information has been used, and the second indication from the third party website that a request to alter second identity information of the user has been initiated, wherein match analysis criteria to determine the potential misuse of the first identity information is customizable by the user, an administrator of the monitoring system, or a combination thereof; and
determining one or more actions to take if the use of the first identity information is a potential misuse, wherein the one or more actions include polling the user as to whether the use of the first identity information is a misuse and, in response to the user indicating that the use of the first identity information is a misuse, having the third party website request proof of identity to verify the identity of the person who submitted the request to alter the second identity information.
17 Assignments
0 Petitions
Accused Products
Abstract
Monitoring for potential misuses of identity information is disclosed. A profile comprising a user'"'"'s identity information is received. An indication from a third party website that at least a portion of the identity information in the user'"'"'s profile is being or has been provided to register at the third party website, alter user information stored by the third party website, or both is received. Whether the indicated use of the identity information is a potential misuse is evaluated.
-
Citations
13 Claims
-
1. A method of monitoring for potential misuses of identity information comprising:
-
creating, at a monitoring system, an electronic profile comprising first identity information of a user; receiving, at the monitoring system, from a third party website; a first indication that at least a portion of the first identity information has been used to successfully log into an account of the user that is maintained by the third party website; and a second indication that a request to alter second identity information of the user stored by the third party website has been initiated while the account was successfully logged into; evaluating whether the use of the first identity information is a potential misuse based on a match analysis of information from the electronic profile of the user created at the monitoring system, the first indication from the third party website that at least a portion of the first identity information has been used, and the second indication from the third party website that a request to alter second identity information of the user has been initiated, wherein match analysis criteria to determine the potential misuse of the first identity information is customizable by the user, an administrator of the monitoring system, or a combination thereof; and determining one or more actions to take if the use of the first identity information is a potential misuse, wherein the one or more actions include polling the user as to whether the use of the first identity information is a misuse and, in response to the user indicating that the use of the first identity information is a misuse, having the third party website request proof of identity to verify the identity of the person who submitted the request to alter the second identity information. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system for monitoring for potential misuses of identity information, including:
-
a processor; and a memory coupled with the processor, wherein the memory is configured to provide the processor with instructions which when executed cause the processor to; create an electronic profile comprising first identity information of a user; receive from a third party website; a first indication that at least a portion of the first identity information has been used to successfully log into an account of the user that is maintained by the third party website; and a second indication that a request to alter second identity information of the user stored by the third party website has been initiated while the account was successfully logged into; evaluate whether the use of the first identity information is a potential misuse based on a match analysis of information from the electronic profile of the user, the first indication from the third party website that at least a portion of the first identity information has been used, and the second indication from the third party website that a request to alter second identity information of the user has been initiated, wherein match analysis criteria to determine the potential misuse of the first identity information is customizable by the user, an administrator of the system, or a combination thereof; and determining one or more actions to take if the use of the first identity information is a potential misuse, wherein the one or more actions include polling the user as to whether the use of the first identity information is a misuse and, in response to the user indicating that the use of the first identity information is a misuse, having the third party website request proof of identity to verify the identity of the person who submitted the request to alter the second identity information. - View Dependent Claims (9, 10, 11)
-
-
12. A non-transitory computer storage medium having embodied thereon computer instructions which when executed by a computer cause the computer to perform a method comprising:
-
creating, at the computer, an electronic profile comprising first identity information of a user; receiving from a third party website; a first indication that at least a portion of the first identity information has been used to successfully log into an account of the user that is maintained by the third party website; and a second indication that a request to alter second identity information of the user stored by the third party website has been initiated while the account was successfully logged into; evaluating whether the use of the first identity information is a potential misuse based on a match analysis of information from the created electronic profile from the computer, the indication from the third party website that at least a portion of the first identity information has been used, and the indication from the third party website that a request to alter second identity information of the user has been initiated, wherein match analysis criteria to determine the potential misuse of the first identity information is customizable by the user, an administrator of the computer, or a combination thereof; and determining one or more actions to take if the use of the first identity information is a potential misuse, wherein the one or more actions include polling the user as to whether the use of the first identity information is a misuse and, in response to the user indicating that the use of the first identity information is a misuse, having the third party website request proof of identity to verify the identity of the person who submitted the request to alter the second identity information. - View Dependent Claims (13)
-
Specification