Systems and methods of identity protection and management
First Claim
1. A method of monitoring and handling potential identity theft threats, the method being performed by a monitoring computer having one or more computer processors, the method comprising:
- receiving a request, by the monitoring computer, from a user to monitor a third party account of the user with an online service provider, the request including personal information associated with the user and a plurality of user preferences, each user preference specifying one or more protective actions to be taken in response to detection, by the monitoring computer, of a change or attempted change to personal information associated with the account;
periodically monitoring the third party account of the user for indications of changes or attempted changes to personal information associated with the account;
detecting a change or attempted change to personal information associated with the account;
determining a risk level associated with the detected change or attempted change to personal information associated with the account;
identifying, from the user preferences, a user preference associated with the determined risk level;
transmitting, via a communication channel, a notification to the user, wherein the communication channel is specified by the user preference; and
initiating one or more protective actions included in the identified user preference.
1 Assignment
0 Petitions
Accused Products
Abstract
In an embodiment, a computing system, such as a monitoring computer, receives a request from a user to monitor an account of the user with an online service provider. The request may include personal information and user preferences for one or more protective actions. The system periodically monitors external data sources for indications of changes to personal information associated with the account, and detects changes or attempted changes to personal information associated with the account. The system may determine risk levels associated with detected changes or attempted changes, and transmit a notification to the user via a communication channel selected based on the determined risk level and/or the user preferences. The system may also initiate protective actions, so that further unauthorized access to the account may be prevented.
733 Citations
20 Claims
-
1. A method of monitoring and handling potential identity theft threats, the method being performed by a monitoring computer having one or more computer processors, the method comprising:
-
receiving a request, by the monitoring computer, from a user to monitor a third party account of the user with an online service provider, the request including personal information associated with the user and a plurality of user preferences, each user preference specifying one or more protective actions to be taken in response to detection, by the monitoring computer, of a change or attempted change to personal information associated with the account; periodically monitoring the third party account of the user for indications of changes or attempted changes to personal information associated with the account; detecting a change or attempted change to personal information associated with the account; determining a risk level associated with the detected change or attempted change to personal information associated with the account; identifying, from the user preferences, a user preference associated with the determined risk level; transmitting, via a communication channel, a notification to the user, wherein the communication channel is specified by the user preference; and initiating one or more protective actions included in the identified user preference. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A computing system configured to monitor and handle potential identity theft threats, comprising:
-
a non-transitory computer-readable storage medium having stored thereon a plurality of executable software modules; one or more computer hardware processors configured to execute the plurality of software modules stored on the computer-readable storage medium; a network interface; a message monitoring module configured to access an electronic message received in an electronic mail account of a user and determine whether the electronic message indicates a change, a possible change, or an attempted change to personal information associated with an external account of the user; an event notification module configured to determine a risk level associated with the indicated change, possible change, or attempted change to personal information associated with the external account of the user and identify a user preference associated with the determined risk level in response to the message monitoring module determining that the electronic message indicates a change, a possible change, or an attempted change to personal information associated with the external account of the user, wherein the user preference specifies one or more user-customizable responsive actions to execute in response to determining that the electronic message indicates a change, a possible change, or an attempted change to personal information; and the event notification module further configured to execute at least one of the one or more user-customizable responsive actions based upon the user preference. - View Dependent Claims (8, 9, 10, 11, 12, 13)
-
-
14. Non-transitory physical computer storage comprising computer-executable instructions stored thereon that, when executed by a hardware processor, are configured to perform operations comprising:
-
receiving a request from a user to monitor a third party account of the user with an online service provider, the request including personal information associated with the user and a plurality of user preferences, each user preference specifying one or more protective actions to be taken in response to detection of a change or attempted change to personal information associated with the account; periodically monitoring the third party account of the user for indications of changes or attempted changes to personal information associated with the account; detecting a change or attempted change to personal information associated with the account; determining a risk level associated with the detected change or attempted change to personal information associated with the account; identifying, from the user preferences, a user preference associated with the determined risk level; transmitting, via a communication channel, a notification to the user, wherein the communication channel is specified by the user preference; and initiating one or more protective actions included in the identified user preference. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification