×

Identity security architecture systems and methods

  • US 10,699,028 B1
  • Filed: 06/19/2018
  • Issued: 06/30/2020
  • Est. Priority Date: 09/28/2017
  • Status: Active Grant
First Claim
Patent Images

1. A identity security system, the identity security system comprising:

  • a non-transitory data storage configured to store computer executable instructions for an identity data analysis system;

    a dark web data store configured to store compromised data related to users'"'"' personal identifying information (PII) and aggregated statistics calculated based on the compromised data;

    a plurality of identity alerts data stores configured to store alerts sent to the users and metadata associated with the alerts;

    an identity metrics data store configured to store depersonalized summary statistics; and

    a hardware processor programmed to execute the computer executable instructions in the non-transitory data storage to cause the identity security system to;

    receive an instruction to generate an alert comprising personalized metrics of a user, wherein the instruction comprises PII of the user;

    query a dark web data store with the PII of the user to acquire information on security compromises related to the PII of the user;

    query an identity alerts data store with geographic location information of the user to obtain report statistics associated with a geographic region of the user;

    query an identity metrics database to obtain the depersonalized summary statistics, wherein the depersonalized summary statistics are generated based on a group of individuals whose PIIs overlaps at least with a portion of the user'"'"'s PII;

    generate an alert which comprises information on security compromises related to the PII of the user, report statistics associated with a geographic region of the user, and the depersonalized summary statistics; and

    deliver the alert to a client computing device via a network, wherein compromised PIIs are acquired from dark web sites using one or more automated data collection processes.

View all claims
  • 6 Assignments
Timeline View
Assignment View
    ×
    ×