System and methods for identifying compromised personally identifiable information on the internet
First Claim
Patent Images
1. A method comprising:
- generating, by a computer system, a search-engine query from stored identity-theft nomenclature;
querying, by the computer system, at least one search engine via the search-engine query;
crawling, by the computer system, at least one computer-network resource identified via the querying;
collecting, by the computer system, identity-theft information from the at least one computer-network resource;
wherein the at least one computer-network resource comprises a chat room;
wherein the collecting comprises logging chat dialog from the chat room into a chat log database; and
processing, by the computer system, the identity-theft information for compromised personally-identifying information (PII), wherein the processing comprises discovering new chat rooms based, at least in part, on an analysis of chat dialogs in the chat log database and storing the compromised PII.
1 Assignment
0 Petitions
Accused Products
Abstract
In one embodiment, a method includes generating, by a computer system, a search-engine query from stored identity-theft nomenclature. The method also includes querying, by the computer system, at least one search engine via the search-engine query. Further, the method includes crawling, by the computer system, at least one computer-network resource identified via the querying. In addition, the method includes collecting, by the computer system, identity-theft information from the at least one computer-network resource. Additionally, the method includes processing, by the computer system, the identity-theft information for compromised personally-identifying information (PII).
470 Citations
17 Claims
-
1. A method comprising:
-
generating, by a computer system, a search-engine query from stored identity-theft nomenclature; querying, by the computer system, at least one search engine via the search-engine query; crawling, by the computer system, at least one computer-network resource identified via the querying; collecting, by the computer system, identity-theft information from the at least one computer-network resource; wherein the at least one computer-network resource comprises a chat room; wherein the collecting comprises logging chat dialog from the chat room into a chat log database; and processing, by the computer system, the identity-theft information for compromised personally-identifying information (PII), wherein the processing comprises discovering new chat rooms based, at least in part, on an analysis of chat dialogs in the chat log database and storing the compromised PII. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A computer-program product comprising a non-transitory computer-readable storage medium having computer-readable program code embodied therein, the computer-readable program code adapted to be executed to implement a method comprising:
-
generating a search-engine query from stored identity-theft nomenclature; querying at least one search engine via the search-engine query; crawling at least one computer-network resource identified via the querying; collecting identity-theft information from the at least one computer-network resource; and wherein the at least one computer-network resource comprises a chat room; wherein the collecting comprises logging chat dialog from the chat room into a chat log database; and processing the identity-theft information for compromised personally-identifying information (PII), wherein the processing comprises discovering new chat rooms based, at least in part, on an analysis of chat dialogs in the chat log database and storing the compromised PII.
-
Specification