System and methods for identifying compromised personally identifiable information on the internet
First Claim
Patent Images
1. A method comprising:
- accessing, by a computer system, stored identity-theft nomenclature;
wherein the stored identity-theft nomenclature comprises a changing set of words and phrases determined to be suggestive of at least one of;
identity theft; and
exchange of identity-theft information;
generating, by the computer system, a search-engine query from the stored identity-theft nomenclature;
querying, by the computer system, at least one search engine via the search-engine query;
identifying, by the computer system, at least one new computer-network resource responsive to the querying;
crawling, by the computer system, the at least one new computer-network resource;
collecting, by the computer system, identity-theft information from the at least one new computer-network resource;
processing, by the computer system, the identity-theft information for compromised personally-identifying information (PII); and
wherein the processing comprises;
analyzing the identity-theft information for new identity-theft nomenclature; and
storing any new identity-theft nomenclature with the stored identity-theft nomenclature.
3 Assignments
0 Petitions
Accused Products
Abstract
In one embodiment, a method includes generating, by a computer system, a search-engine query from stored identity-theft nomenclature. The method also includes querying, by the computer system, at least one search engine via the search-engine query. Further, the method includes crawling, by the computer system, at least one computer-network resource identified via the querying. In addition, the method includes collecting, by the computer system, identity-theft information from the at least one computer-network resource. Additionally, the method includes processing, by the computer system, the identity-theft information for compromised personally-identifying information (PII).
490 Citations
24 Claims
-
1. A method comprising:
-
accessing, by a computer system, stored identity-theft nomenclature; wherein the stored identity-theft nomenclature comprises a changing set of words and phrases determined to be suggestive of at least one of; identity theft; and exchange of identity-theft information; generating, by the computer system, a search-engine query from the stored identity-theft nomenclature; querying, by the computer system, at least one search engine via the search-engine query; identifying, by the computer system, at least one new computer-network resource responsive to the querying; crawling, by the computer system, the at least one new computer-network resource; collecting, by the computer system, identity-theft information from the at least one new computer-network resource; processing, by the computer system, the identity-theft information for compromised personally-identifying information (PII); and wherein the processing comprises; analyzing the identity-theft information for new identity-theft nomenclature; and storing any new identity-theft nomenclature with the stored identity-theft nomenclature. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23)
-
-
24. A computer-program product comprising a non-transitory computer-usable medium having computer-readable program code embodied therein, the computer-readable program code adapted to be executed to implement a method comprising:
-
accessing stored identity-theft nomenclature; wherein the stored identity-theft nomenclature comprises a changing set of words and phrases determined to be suggestive of at least one of; identity theft; and exchange of identity-theft information; generating a search-engine query from the stored identity-theft nomenclature; querying at least one search engine via the search-engine query; identifying at least one new computer-network resource responsive to the querying; crawling the at least one new computer-network resource; collecting identity-theft information from the at least one new computer-network resource; processing the identity-theft information for compromised personally-identifying information (PII); and wherein the processing comprises; analyzing the identity-theft information for new identity-theft nomenclature; and storing any new identity-theft nomenclature with the stored identity-theft nomenclature.
-
Specification