Data security seeding system
First Claim
Patent Images
1. A monitoring security system for tracking seed data-comprising:
- seed data for insertion into a secured private information database listing, wherein the seed data includes the following information data strings, a fictitious name having both a first and last name portion and a fictitious credit card and/or debit card number, and the seed data further includes a phone number created to match to and assigned with the fictitious name that is also capable of receiving telephone and/or fax communications;
a network;
a computer connected to the network and configured to monitor incoming communications to the network;
a database connected to the computer, the database configured to store a record of the seed data, and the database is further configured to store a pre-recorded voice message corresponding to the phone number defined by the seed data;
the computer, upon receiving a notice of an attempted transaction on the fictitious credit card and/or debit card number corresponding to the seed data, having software running on a processor of the computer to store third party identification information relating to the attempted transaction and the software is further configured to forward the third party identification information and/or a copy of the attempted transaction to the database and/or to a user for determining whether the attempted transaction was conducted by breaching the secured private information database listing, andthe computer, upon receiving a notice of an incoming phone call placed to the phone number corresponding to the seed data, having software configured to playback to an intended recipient of the incoming phone call, the pre-recorded voice message and further configured to store a caller identification phone number and/or record a caller voice message from the incoming phone call; and
the software being further configured to forward the caller identification phone number and/or recorded caller voice message from the incoming phone call to a user for a determination of whether the incoming phone call was conducted by breaching the secured private information database listing.
2 Assignments
0 Petitions
Accused Products
Abstract
In one aspect of the invention there is provided a system for tracking seed data that has been inserted into a secured private information database listing. The system includes a network, computer, and database. Incoming communications to the network are monitored and are matched to a phone number, credit card number, address, email, or fax number that corresponds to the seed data. Depending on the incoming communication software is configured to track and store third party identification information. The information is sent to a user to determine if the incoming phone call was conducted by breaching the secured private information database listing.
-
Citations
10 Claims
-
1. A monitoring security system for tracking seed data-comprising:
-
seed data for insertion into a secured private information database listing, wherein the seed data includes the following information data strings, a fictitious name having both a first and last name portion and a fictitious credit card and/or debit card number, and the seed data further includes a phone number created to match to and assigned with the fictitious name that is also capable of receiving telephone and/or fax communications; a network; a computer connected to the network and configured to monitor incoming communications to the network; a database connected to the computer, the database configured to store a record of the seed data, and the database is further configured to store a pre-recorded voice message corresponding to the phone number defined by the seed data; the computer, upon receiving a notice of an attempted transaction on the fictitious credit card and/or debit card number corresponding to the seed data, having software running on a processor of the computer to store third party identification information relating to the attempted transaction and the software is further configured to forward the third party identification information and/or a copy of the attempted transaction to the database and/or to a user for determining whether the attempted transaction was conducted by breaching the secured private information database listing, and the computer, upon receiving a notice of an incoming phone call placed to the phone number corresponding to the seed data, having software configured to playback to an intended recipient of the incoming phone call, the pre-recorded voice message and further configured to store a caller identification phone number and/or record a caller voice message from the incoming phone call; and the software being further configured to forward the caller identification phone number and/or recorded caller voice message from the incoming phone call to a user for a determination of whether the incoming phone call was conducted by breaching the secured private information database listing. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method for a security monitoring system of tracking fictitious seed data against theft of a secured private information database listing containing the fictitious seed data, the method comprising:
-
creating seed data for insertion into a secured private information database listing, wherein the seed data includes the following information data strings, a fictitious name having both a first and last name portion and a fictitious credit card number and/or fictitious debit card number associated to the fictitious name; providing a computer connected to a network, wherein the computer is connected to a database and the database is configured to store a record of the seed data; monitoring incoming communications to the network; wherein upon receiving a notice of an attempted transaction on the fictitious credit card and/or debit card number corresponding to the seed data, storing information on the attempted transaction; and forwarding information on the attempted transaction to a user for determining whether the incoming communication was conducted by breaching the secured private information database listing, and wherein the seed data further includes a real email address associated with the fictitious name and the method further includes the step of storing a copy of an incoming email made to an email address corresponding to the seed data and forwarding the copy of the incoming email to the user for a determination of whether the incoming email was conducted by breaching the secured private information database listing, and wherein the seed data further includes a real phone number created to match to and assigned with the fictitious name and the method further includes the step of storing a pre-recorded voice message corresponding to the phone number defined by the seed data and wherein upon receiving a notice of an incoming phone call placed to the phone number corresponding to the seed data, playing back to a recipient of the incoming phone call the pre-recorded voice message and storing caller identification information, and forwarding the caller identification information to a user for determining whether the incoming communication was conducted by breaching the secured private information database listing. - View Dependent Claims (8, 9)
-
-
10. A method for a security monitoring system of tracking fictitious seed data against theft of a secured private information database listing containing the fictitious seed data, the method comprising:
-
creating seed data for insertion into a secured private information database listing, wherein the seed data includes the following information data strings, a fictitious name having both a first and last name portion, a real email address associated with the fictitious name and a real phone number created to match to and assigned with the fictitious name; providing a computer connected to a network, wherein the computer is connected to a database and the database is configured to store a record of the seed data and to store a pre-recorded voice message corresponding to the phone number defined by the seed data; monitoring incoming communications to the network; wherein upon receiving a notice of an incoming phone call placed to the phone number corresponding to the seed data, playing back to a recipient of the incoming phone call the pre-recorded voice message and storing caller identification information; wherein upon receiving a notice of another type of incoming communication from a third party and sent to the send data, including;
a text message, an instant message, a short message service message, an enhanced messaging service message, a multimedia messaging service message, a photo, a video clip, a fax message, an internet relay chat message, email message, or direct mailing communication, storing third party identification information associated with the third party; andforwarding the third party identification information to a user for determining whether the incoming communication was conducted by breaching the secured private information database listing.
-
Specification