×

Data security seeding system

  • US 9,367,684 B2
  • Filed: 05/24/2012
  • Issued: 06/14/2016
  • Est. Priority Date: 12/15/2011
  • Status: Expired due to Fees
First Claim
Patent Images

1. A monitoring security system for tracking seed data-comprising:

  • seed data for insertion into a secured private information database listing, wherein the seed data includes the following information data strings, a fictitious name having both a first and last name portion and a fictitious credit card and/or debit card number, and the seed data further includes a phone number created to match to and assigned with the fictitious name that is also capable of receiving telephone and/or fax communications;

    a network;

    a computer connected to the network and configured to monitor incoming communications to the network;

    a database connected to the computer, the database configured to store a record of the seed data, and the database is further configured to store a pre-recorded voice message corresponding to the phone number defined by the seed data;

    the computer, upon receiving a notice of an attempted transaction on the fictitious credit card and/or debit card number corresponding to the seed data, having software running on a processor of the computer to store third party identification information relating to the attempted transaction and the software is further configured to forward the third party identification information and/or a copy of the attempted transaction to the database and/or to a user for determining whether the attempted transaction was conducted by breaching the secured private information database listing, andthe computer, upon receiving a notice of an incoming phone call placed to the phone number corresponding to the seed data, having software configured to playback to an intended recipient of the incoming phone call, the pre-recorded voice message and further configured to store a caller identification phone number and/or record a caller voice message from the incoming phone call; and

    the software being further configured to forward the caller identification phone number and/or recorded caller voice message from the incoming phone call to a user for a determination of whether the incoming phone call was conducted by breaching the secured private information database listing.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×