Compiling information obtained by combinatorial searching
First Claim
Patent Images
1. A computer-readable medium having stored in memory computer executable instructions that when executed by a computer are configured to perform the following:
- search for a first piece of sensitive information, the first piece of sensitive information including personal information regarding at least one user;
search for a second piece of sensitive information, the second piece of sensitive information including personal information regarding the at least one user;
obtain a result of the search for the first piece of sensitive information, the first piece of sensitive information being of a first type;
obtain a result of the search for the second piece of sensitive information, the second piece of sensitive information being of a second type, the first type of information being different than the second type of information;
assign a first score, the first score being determined from the number of occurrences of the first piece of sensitive data, as revealed in the search for the first piece of sensitive data;
assign a second score, the second score being determined from the number of occurrences of the second piece of sensitive data, as revealed in the search for the second piece of sensitive data;
combine the first score and the second score;
provide the combined score to a user; and
automatically determine, from the combined, score and a combination of sensitive information types searched, a risk for at least one identity-related vulnerability,wherein sensitive information includes at least one of the following;
a name, an address, a social security number, a telephone number, and an email address.
9 Assignments
0 Petitions
Accused Products
Abstract
Included are embodiments for searching sensitive information. At least one embodiment of a method includes searching for a first piece of sensitive information, searching for a second piece of sensitive information, and combining a score associated with the search for the first piece of sensitive information and a score associated with the search for the second piece of sensitive information.
173 Citations
17 Claims
-
1. A computer-readable medium having stored in memory computer executable instructions that when executed by a computer are configured to perform the following:
-
search for a first piece of sensitive information, the first piece of sensitive information including personal information regarding at least one user; search for a second piece of sensitive information, the second piece of sensitive information including personal information regarding the at least one user; obtain a result of the search for the first piece of sensitive information, the first piece of sensitive information being of a first type; obtain a result of the search for the second piece of sensitive information, the second piece of sensitive information being of a second type, the first type of information being different than the second type of information; assign a first score, the first score being determined from the number of occurrences of the first piece of sensitive data, as revealed in the search for the first piece of sensitive data; assign a second score, the second score being determined from the number of occurrences of the second piece of sensitive data, as revealed in the search for the second piece of sensitive data; combine the first score and the second score; provide the combined score to a user; and automatically determine, from the combined, score and a combination of sensitive information types searched, a risk for at least one identity-related vulnerability, wherein sensitive information includes at least one of the following;
a name, an address, a social security number, a telephone number, and an email address. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A computer method comprising:
-
searching for a first piece of sensitive information, the first piece of sensitive information including personal information regarding at least one user; searching for a second piece of sensitive information, the second piece of sensitive information including personal information regarding the at least one user; obtaining a result of the search for the first piece of sensitive information, the first piece of sensitive information being of a first type; obtaining a result of the search for the second piece of sensitive information, the second piece of sensitive information being of a second type, the first type of information being different than the second type of information; assigning a first score, the first score being determined from the number of occurrences of the first piece of sensitive data, as revealed in the search for the first piece of sensitive data; assigning a second score, the second score being determined from the number of occurrences of the second piece of sensitive data, as revealed in the search for the second piece of sensitive data; combining, by an electronic device, the first score and the second score; providing, by the electronic device, the combined score to a user; and automatically determining, from the combined score and a combination of sensitive information types searched, a risk for at least one identity-related vulnerability, wherein sensitive information includes at least one of the following;
a name, an address, a social security number, a telephone number, and an email address. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A system comprising:
-
a processor; and a memory that stores; a first searching component configured to search for a first piece of sensitive information, the first piece of sensitive information including personal information regarding at least one user; a second searching component configured to search for a second piece of sensitive information, the second piece of sensitive information including personal information regarding the at least one user; a first obtaining component configured to obtain a result of the search for the first piece of sensitive information, the first piece of sensitive information being of a first type; a second obtaining component configured to obtain a result of the search for the second piece of sensitive information, the second piece of sensitive information being of a second type, the first type of information being different than the second type of information; a first assigning component configured to assign a first score, the first score being determined from the number of occurrences of the first piece of sensitive data, as revealed in the search for the first piece of sensitive data; a second assigning component configured to assign a score, the second score being determined from the number of occurrences of the second piece of sensitive data, as revealed in the search for the second piece of sensitive data; a combining component configured to combine the first score and the second score; a providing component configured to provide the combined score to a user; and a determining component configured to automatically determine, from the combined score and a combination of sensitive information types searched, a risk for at least one identity-related vulnerability, wherein sensitive information includes at least one of the following;
a name, an address, a social security number, a telephone number, and an email address. - View Dependent Claims (14, 15, 16, 17)
-
Specification