Systems and methods of identity protection and management
First Claim
1. A method of monitoring potential identity theft threats, the method being performed by a monitoring computer having one or more computer processors, the method comprising:
- receiving a request, by the monitoring computer, from a user to monitor a third party account of the user with an online service provider, the request including personal information associated with the third party account;
periodically monitoring the third party account of the user for indications of changes or attempted changes to personal information associated with the third party account;
as part of the periodic monitoring,detecting a change or attempted change to personal information associated with the third party account;
determining a risk level associated with the detected change or attempted change to personal information associated with the third party account; and
determining, based at least in part on the determined risk level, one or more protective actions; and
transmitting to a user computing device a notification of the detected change or attempted change, and a request to select one or more of the protective actions to be taken in response to the detected change or attempted change;
receiving from the user computing device an indication of selection of one or more of the protective actions by the user; and
initiating the one or more protective actions selected by the user.
1 Assignment
0 Petitions
Accused Products
Abstract
In an embodiment, a computing system, such as a monitoring computer, receives a request from a user to monitor an account of the user with an online service provider. The request may include personal information and user preferences for one or more protective actions. The system periodically monitors external data sources for indications of changes to personal information associated with the account, and detects changes or attempted changes to personal information associated with the account. The system may determine risk levels associated with detected changes or attempted changes, and transmit a notification to the user via a communication channel selected based on the determined risk level and/or the user preferences. The system may also initiate protective actions, so that further unauthorized access to the account may be prevented.
1354 Citations
15 Claims
-
1. A method of monitoring potential identity theft threats, the method being performed by a monitoring computer having one or more computer processors, the method comprising:
-
receiving a request, by the monitoring computer, from a user to monitor a third party account of the user with an online service provider, the request including personal information associated with the third party account; periodically monitoring the third party account of the user for indications of changes or attempted changes to personal information associated with the third party account; as part of the periodic monitoring, detecting a change or attempted change to personal information associated with the third party account; determining a risk level associated with the detected change or attempted change to personal information associated with the third party account; and determining, based at least in part on the determined risk level, one or more protective actions; and transmitting to a user computing device a notification of the detected change or attempted change, and a request to select one or more of the protective actions to be taken in response to the detected change or attempted change; receiving from the user computing device an indication of selection of one or more of the protective actions by the user; and initiating the one or more protective actions selected by the user. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method of monitoring potential identity theft threats, the method being performed by a monitoring computer having one or more computer processors, the method comprising:
-
receiving a request, by the monitoring computer, from a user to monitor an electronic communication account or device of the user; periodically monitoring electronic communications in the electronic communication account or device of the user for changes, possible changes, or attempted changes to personal information associated with another account of the user; as part of the periodic monitoring, detecting a change, a possible change, or an attempted change to personal information associated with said another account of the user; determining a risk level associated with the detected change, possible change, or attempted change to personal information associated with said another account of the user; and determining, based at least in part on the determined risk level, one or more protective actions; and transmitting to a user computing device a notification of the detected change, possible change, or attempted change, and a request to select one or more of the protective actions to be taken in response to the detected change, possible change, or attempted change; receiving from the user computing device an indication of selection of one or more of the protective actions by the user; and initiating the one or more protective actions selected by the user. - View Dependent Claims (9, 10, 11, 12, 13)
-
-
14. A computing system configured to monitor and handle potential identity theft threats, comprising:
-
a non-transitory computer-readable storage medium having stored thereon a plurality of executable software modules; a network interface; and one or more computer hardware processors configured to execute the plurality of executable software modules stored on the computer-readable storage medium, wherein the one or more processors execute; a credentials monitoring module to access a third party account of a user and determine whether a response from the third party account indicates a change or attempted change to personal information associated with the third party account of the user; determine a risk level associated with the detected change or attempted change to personal information associated with the third party account of the user; and determine, based at least in part on the determined risk level, one or more protective actions; an event notification module to transmit, via the network interface, to a user computing device a notification of the detected change or attempted change and a request to select one or more of the protective actions to be taken in response to the detected change or attempted change; a user interface module to receive, via the network interface, from the user computing device an indication of selection of one or more of the protective actions by the user; and the event notification module further to execute the one or more protective actions selected by the user. - View Dependent Claims (15)
-
Specification