DATA SECURITY SEEDING SYSTEM
First Claim
1. A monitoring security system for tracking seed data-comprising:
- seed data for insertion into a secured private information database listing, wherein the seed data includes the following information data strings, a fictitious name having both a first and last name portion and a fictitious credit card and/or debit card number;
a network;
a computer connected to the network and configured to monitor incoming communications to the network;
a database connected to the computer, the database configured to store a record of the seed data;
the computer, upon receiving a notice of an attempted transaction on the fictitious credit card and/or debit card number corresponding to the seed data, having software configured to store third party identification information relating to the attempted transaction and the software is further configured to forward the third party identification information and/or a copy of the attempted transaction to the database and/or to a user for determining whether the attempted transaction was conducted by breaching the secured private information database listing.
2 Assignments
0 Petitions
Accused Products
Abstract
In one aspect of the invention there is provided a system for tracking seed data that has been inserted into a secured private information database listing. The system includes a network, computer, and database. Incoming communications to the network are monitored and are matched to a phone number, credit card number, address, email, or fax number that corresponds to the seed data. Depending on the incoming communication software is configured to track and store third party identification information. The information is sent to a user to determine if the incoming phone call was conducted by breaching the secured private information database listing.
-
Citations
15 Claims
-
1. A monitoring security system for tracking seed data-comprising:
-
seed data for insertion into a secured private information database listing, wherein the seed data includes the following information data strings, a fictitious name having both a first and last name portion and a fictitious credit card and/or debit card number; a network; a computer connected to the network and configured to monitor incoming communications to the network; a database connected to the computer, the database configured to store a record of the seed data; the computer, upon receiving a notice of an attempted transaction on the fictitious credit card and/or debit card number corresponding to the seed data, having software configured to store third party identification information relating to the attempted transaction and the software is further configured to forward the third party identification information and/or a copy of the attempted transaction to the database and/or to a user for determining whether the attempted transaction was conducted by breaching the secured private information database listing. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method for a security monitoring system of tracking fictitious seed data against theft of a secured private information database listing containing the fictitious seed data, the method comprising:
-
creating seed data for insertion into a secured private information database listing, wherein the seed data includes the following information data strings, a fictitious name having both a first and last name portion and a fictitious credit card number and/or fictitious debit card number associated to the fictitious name; providing a computer connected to a network, wherein the computer is connected to a database and the database is configured to store a record of the seed data; monitoring incoming communications to the network; wherein upon receiving a notice of an attempted transaction on the fictitious credit card and/or debit card number corresponding to the seed data, storing information on the attempted transaction; and forwarding information on the attempted transaction to a user for determining whether the incoming communication was conducted by breaching the secured private information database listing. - View Dependent Claims (9, 10, 11, 12)
-
-
13. A method for creating seed data for a secured private information database listing, the method comprising:
-
creating a seed data listing, wherein the seed data listing includes at least the following information, a fictitious name having both a first and last name portion, an email address associated with the fictitious name that is capable of receiving email communications, a phone number created to match to and be assigned with the fictitious name that is capable of receiving telephone and/or fax communications; recording and storing a voice message linked to the telephone number, such that when the telephone number is called the voice message can be replayed; and sending the seed data listing to a user for insertion into a secured private information database listing. - View Dependent Claims (14)
-
-
15. A method for a security monitoring system of tracking fictitious seed data against theft of a secured private information database listing containing the fictitious seed data, the method comprising:
-
creating seed data for insertion into a secured private information database listing, wherein the seed data includes the following information data strings, a fictitious name having both a first and last name portion, a real email address associated with the fictitious name and a real phone number created to match to and assigned with the fictitious name; providing a computer connected to a network, wherein the computer is connected to a database and the database is configured to store a record of the seed data and to store a pre-recorded voice message corresponding to the phone number defined by the seed data; monitoring incoming communications to the network; wherein upon receiving a notice of an incoming phone call placed to the phone number corresponding to the seed data, playing back to a recipient of the incoming phone call the pre-recorded voice message and storing caller identification information; wherein upon receiving a notice of another type of incoming communication from a third party and sent to the send data, such as;
a text message, an instant message, a short message service message, an enhanced messaging service message, a multimedia messaging service message, a photo, a video clip, a fax message, an internet relay chat message, email message, or direct mailing communication, storing third party identification information associated with the third party; andforwarding the third party identification information to a user for determining whether the incoming communication was conducted by breaching the secured private information database listing.
-
Specification