Pre-data breach monitoring

Information

  • Patent Grant
  • 11568348
  • Patent Number
    11,568,348
  • Date Filed
    Thursday, May 6, 2021
    3 years ago
  • Date Issued
    Tuesday, January 31, 2023
    2 years ago
Abstract
A method for providing pre-data breach monitoring provides information to businesses that is useful to predict portions of the company data that may not be secured well enough and other risks associated with data breaches, such as employees that may not be trustworthy.
Description
BACKGROUND

With consumers providing personal information more frequently to online websites and services, data breaches of that personal data held by companies are becoming more frequent. In general, a data breach occurs when personal information of customers is compromised. For example, a fraudster may hack into a customer database in order to access personal information of the customers, such as name, address, contact information, credit card or other billing information, secret questions and answers, social security number, etc.


SUMMARY

In the event of a data breach, the breached company can perform remediation processes, but it would be advantageous for the company to prevent the breach from occurring, or at least identify the breach as soon as possible so such remediation processes can be performed before extensive damage to the identity of the company's customers has occurred.


Disclosed herein are systems and methods for pre-breach data monitoring that may be used to detect possible breaches of personal information, such as information of customers and/or employees of a company. For example, a pre-breach monitoring system may provide information to a requesting entity (e.g., a business) that is useful to predict portions of the company data (e.g., employee and/or customer information) that may not be secured well enough and other risks associated with data breaches, such as employees that may not be trustworthy.


Described herein, among other things, are systems and methods for enabling a requesting entity to request that a pre-breach system monitors one or more data sources in order to identify information associated with consumers affiliated with the requesting entity (e.g., customers and/or employees), and to then generate one or more data breach risk score that are usable to predict portions of the requesting entity's data that may not be secured well enough. In one embodiment, the requesting entity provides the pre-breach system with a file including identification information of a plurality of consumers (e.g., employees and/or customers of the requesting entity) and requests a comparative scan from a plurality of data sources. One or more breach risk scores may be generated based on the results from the comparative scan. The risk scores may then be provided to the requesting entity.


In one embodiment, a method of monitoring online data to predict or determine a risk of data breach associated with customers and/or employees of a requesting entity comprises receiving a scan list comprising information regarding a plurality of individuals associated with a requesting entity, periodically scanning a plurality of data sources for information regarding the individual on the scan list, identifying, for each of a plurality of data breach risk categories, a quantity of located data regarding the individuals, for each of the plurality of data breach risk categories, determining a difference between the quantity of located data and a quantity of located data identified in one or more previous scans of the plurality of data sources, and based on at least the determined differences for respective data breach risk categories, providing the requesting entity with an assessment of potential or actual data breach, wherein the assessment is usable to determine a likelihood of whether the requesting entity's data has been breached.


In one embodiment, the assessment of potential or actual data breaches includes a risk score for each of the data breach risk categories based on at least the determined difference for respective data breach risk categories. An overall risk score may be based on risk scores for each of the data breach risk categories. The overall risk score may be an average of the risk scores for each of the data breach risk categories. A first of the risk scores may be weighted more heavily in determining the overall risk score than a second of the risk scores.


In one embodiment, the plurality of data breach risk categories includes one or more of public internet, dark web, social media, sex offender, healthcare, or fraud risk. Public internet data sources may include any sites that are available via a typical browser, such as sites that are locatable by typing in a URL or locatable by an internet search engine (e.g., Google). Dark web data sources may include sites or other information on network hosts that are not widely accessible on the Internet, and may also be referred to as dark address space. Such dark web sites may have domains (e.g., .onion) that are only accessible with particular software or browsers (e.g., Tor). Because of the way some of these dark web browsers and hosts are configures, both the host serving out web pages and the requesting client may be obscured and not easily identifiable. Social media data sources may include any number of sites wherein users can share information, comments, interests, photographs, etc., either on a personal or professions level. Examples of currently available social media sites include Facebook, Twitter, LinkedIn, Pinterest, and countless others. Sex offender data sources may include government operated databases and/or private database that may include information from one or more governments and/or information obtained from other sources. Healthcare data sources include any data regarding health information of individuals, including HIPAA (Health Insurance Portability and Accountability Act) and non-HIPAA information. Healthcare data sources may include insurance sites, patient health records sites, health care provider sites, government healthcare sites, and/or any other data sources that may include information regarding health of individuals. In some embodiments, certain data sources may be associated with multiple risk categories. For example, a social media site may also include healthcare information and, thus, may be associated with both a social media and a healthcare category. Fraud risk data sources may include sites and/or services that provide information regarding risk of fraud associated with an individual. For example, a third party service may lookup information associated with an individual and provide back a fraud risk score (or simply “fraud score”) that indicates a likelihood that the person really is who they say they are and/or a risk of fraud being perpetrated by the individual.


In one embodiment, the periodic scanning is performed on a frequency determined by the requesting entity. The generated scores may indicate respective percentage changes between the quantity of located data and a quantity of located data identified in one or more previous scans of the plurality of data sources. The method may further comprises providing indications of one or more measures taken to improve the risks identified. The measures taken to improve the risks identified by one requesting entity may be compared with the measures taken by other businesses or requesting entities. The measures taken to improve the risks identified may be monitored periodically and correspond to a badge associated with the requesting entity.


In one embodiment, in response to determining that the assessment of potential or actual data breach is acceptable, the requesting entity is provided the ability to place a badge on information provided by the requesting entity, the badge indicating that the requesting entity has taken measures to reduce risks of data breach. The badge may be selected from a plurality of badges, wherein respective badges indicate various levels of measures taken to reduce risks of data breach and/or a current level of risk of data breach.





BRIEF DESCRIPTION OF THE DRAWINGS


FIG. 1 is a block diagram illustrating one embodiment of a pre-data breach monitoring device in communication with data sources and a requesting entity.



FIG. 2 is a flowchart illustrating one embodiment of a method for performing fraud scoring and providing the results to a requesting entity.



FIG. 3 is a flowchart illustrating one embodiment of a method for periodically monitoring and comparing fraud scores.



FIG. 4A illustrates an example user interface that allows a requesting entity to select data categories to include in a pre-breach scan, as well as a frequency of performing the scan.



FIG. 4B illustrates an example user interface that provides the requesting entity with a summary of data breach scores for particular data breach categories.



FIG. 5 illustrates an example user interface that provides the requesting entity with a summary of data breach scores for particular data breach categories, as well as a comparisons to data breach scores from a previous period.



FIG. 6 illustrates detailed information regarding fraud scores of individuals associated with an entity and change in data items from a previous and current period.



FIG. 7 illustrates detailed information regarding fraud scores of individuals associated with an entity and change in data items from a previous and current period.



FIG. 8 illustrates an example chart comparing employee fraud scores in a previous period and a current period.



FIGS. 9A-9D are illustrative example charts comparing data associated with various data breach risk categories for two periods.



FIG. 10 illustrates an example fraud score badge placed on a requesting entity's webpage.



FIG. 11 is a block diagram depicting one embodiment of the pre-data breach monitoring system in communication with a network and various systems which are also in communication with the network.





DETAILED DESCRIPTION

Embodiments of the disclosure will now be described with reference to the accompanying figures, wherein like numerals refer to like elements throughout. The terminology used in the description presented herein is not intended to be interpreted in any limited or restrictive manner, simply because it is being utilized in conjunction with a detailed description of certain specific embodiments of the disclosure. Furthermore, embodiments of the disclosure may include several novel features, no single one of which is solely responsible for its desirable attributes or which is essential to practicing the embodiments of the disclosure herein described.


The embodiments disclosed herein describe systems and methods for pre-data breach monitoring. A requesting entity, such as a business, may request generation of a one or more breach risk scores through a pre-data breach monitoring system (also referred to as “pre-breach system”) to predict portions of the requesting entity's data that may not be secured well enough and other risks associated with data breaches. One or more breach risk scores may be generated by comparing data provided by the requesting entity including identification information of a plurality of individual associated with the requesting entity, such as its customers or employees. The breach risk scores may be based on information from one or more data sources, which may be placed into risk categories. For example, data breach risk categories (or simply “risk categories) may include public internet, the Dark Web, social media sites, sex offender databases, heath care, fraudulent activity sites, or fraud risk score. Each of the risk categories may be associated with one or more data sources, such as website, databases, servers, or other data sources. Thus, information for a particular risk category may be retrieved from a plurality of data sources.


In one embodiment, a requesting entity, such as a business, may request generation of one or more data breach risk scores associated with respective risk categories. In one embodiment, such data breach risk scores may be calculated periodically, e.g. monthly, in order to periodically update risks associated with each of the data breach categories.


In one embodiment, changes in risk scores over a period of time may result in the requesting entity being rewarded a badge that reflects the positive improvement. For example, if a requesting entity has an overall risk score (e.g., based on multiple risk scores for respective risk categories) that has decreased by a certain percentage from a previous overall risk score (e.g., from a previous month), the requesting entity may be provided an opportunity to place a badge on the company's website, for example, to serve as an indication that the company is proactive in monitoring how its customers and/or employees data is used. Depending on the embodiment, different levels of badges may be provided to a requesting entity that are indicative of different measures taken by the requesting entity in monitoring for, remediating, and/or preventing breach of company data. In some embodiments, badges may be revoked or downgraded if the requesting entity fails to maintain a suitable level of risk (e.g., one or more risk scores must be maintained above threshold levels) in one or more data breach risk categories.


Example System Implementation



FIG. 1 is a block diagram showing an example configuration of a pre-data breach monitoring system 130 (or “pre-breach system 130”) in communication with a requesting entity 110 and data sources 100. In this embodiment, a requesting entity 110 communicates with the pre-breach system 130 with a request for the pre-breach system 130 to predict portions of the requesting entity's data that may not be secured well enough and/or other risks associated with data breaches. In this embodiment, the requesting entity 110 represents any entity that collects identification information on its customers, employees, or any consumers. Thus the requesting entity 110 may be a business, non-profit organization, government organization, other group, or even an individual consumer. FIG. 11, discussed below, further illustrates example components and operations of the pre-breach system 130.


In one embodiment, the requesting entity 110 requests data breach risk scoring from the pre-breach system 130. In one embodiment, the requesting entity 110 provides the pre-breach system 130 with a scan list comprising one or more data structures including identification information of a plurality of its consumers (or employees) so that the pre-breach system 130 can identify potential misuses of those consumers' information. The pre-breach system 130 may perform (or initiate performance by one or more other computing systems) a scan of one or more data sources 100 for identification information on these respective consumers. The consumer information may include, for example, one or more of: Last Name, First Name, Middle Name, Generation Code, Social Security Number, Date of Birth, Phone Number, Drivers' License, State, Drivers' License Number, Street Address, City Name, State, Zip Code, account number or other custom data associated with an account of the consumer with the requesting entity, Credit card number, credit data, Email, and/or any other data. In one embodiment, the pre-breach system 130 may access and/or download information from multiple data sources and then compare the consumer information from the requesting entity with the accessed information in order to identify any matches. Once such comparisons are performed, the pre-breach system 130 may generate one or more data breach risk scores indicative of data breach risks in respective risk categories. The results may then be provided to the requesting entity 110 in various manners.


In one embodiment, the data sources 100 represent any online, offline, and/or other data sources and/or an entity that scans the various online, offline, and/or other data sources. Depending on the embodiment, data from any number of data sources 100 may be accessed by the pre-breach system 100, whether the pre-breach system 130 scans the data sources itself or receives the information (or summaries of the information) from certain data sources from a third-party entity that perform such scans. For example, a first data source may comprise the public internet, while a second data source may comprise the Dark Web. Other data sources may include data from social networks, sex offender databases, health care databases, fraud risk scoring systems, or any other type of data source that may contain consumer information.


In one embodiment, the data breach risk scores generated by the pre-breach system 130 are based on comparisons of data regarding individuals on the requesting entity's scan list with data regarding the same individuals from one or more previous scans. For example, the pre-breach system 130 may compare a quantity of matches of personal information for a particular requesting entity from a particular data source to the corresponding quantity of matches located in a previous scan in order to determine a risk score for a particular risk category. For example, if a scan list of 1,000 customers results in 50 matches of customer information located on social media sites, but in a previous scan only 40 matches of customer information were identified on social media sites, a risk score for the social media risk category may be calculated based on a comparison of the 40 matches to the 50 matches. For example, a percentage increase/decrease may be included in a data breach risk score.


In one embodiment, the assessment of potential or actual data breaches is performed at least partially manually. In other embodiments, the assessment of potential or actual data breaches is performed at least partially automatically by a computing device.


In one embodiment, the requesting entity 110 can request periodic scanning of customized data breach categories. For example, a requesting entity 110 may choose to have the pre-breach system 130 monitor and scan the public internet and the Dark Web for its consumers' information every month. Based on this periodic scanning, the requesting entity 110 can determine an increase or decrease in actual or potential data breach risks over a period (such as risk associated with respective risk categories, as well as an overall risk score that may be based on multiple category risk scores). Similarly, another requesting entity may request that the pre-breach system 130 scans additional data sources, possibly on a different frequency. Additionally, a requesting entity may establish rules for frequency of scanning different data sources such that data sources associated with a first risk category are scanned at a first frequency (e.g., weekly), while one or more data sources associated with a second risk category are scanned at a second frequency (e.g., quarterly).


In one embodiment, the data breach risk scores generated by the pre-breach system 130 over a period can be assessed and a percentage change may be calculated based on the increase or decrease in respective data breach risk scores. These percentage changes may correspond with a badge that may be awarded to a requesting entity 110 that has met certain requirements in addressing its data breach risks. Depending on the embodiment, this badge may be removed if the requesting entity fails to take continued action to address data breach risks identified.


Example Methods



FIG. 2 is a flowchart illustrating one embodiment of a method of providing data breach risk assessments. In an embodiment, the method shown in FIG. 2 may be performed substantially in real time so that the requesting entity 110 is presented with data breach risk scores and/or detailed reports containing information related to actual or potential data breaches without substantial delay. Alternatively, the method of FIG. 2 may be performed as part of a scheduled batch process, such as a pre-breach scanning process that may be performed on a requesting entities customer and/or employees on a periodic basis. Depending on the embodiment, the method may be performed with fewer or additional blocks than are illustrated in FIG. 2. In one embodiment, the method of FIG. 2 is performed by the pre-breach system 130. However, the method may be performed by one or more other suitable computing systems, such as a computing system that includes data scanning and data breach risk scoring modules that perform similar features to those discussed with reference to the pre-breach system 130. For ease of discussion, the methods discussed below will be described with reference to the pre-breach system 130. However, the methods may be performed by any other suitable computing system.


At block 200, the pre-breach system 130 accesses a scan list from the requesting entity 110 that includes one or more data structures having identification information on a plurality of consumers (e.g., employees and/or customers of the requesting entity). Such information may include, for example, one or more of: Last Name, First Name, Middle Name, Generation Code, Social Security Number, Date of Birth, Phone Number, Drivers' License, State, Drivers' License Number, Street Address, City Name, State, Zip Code, account number or other custom data associated with an account of the consumer with the requesting entity, Credit card number, credit data, Email, and/or any other data. In some embodiments, the information can be accessed through one or more user interfaces provided to the requesting entity 110. Alternatively, the information may be accessed in other manners, such as via a batch process wherein a data structure including information regarding a plurality of consumers is transmitted by the requesting entity to the pre-breach system 130, such as daily, weekly, or monthly. The information may be included in any available file format, such as a database, spreadsheet, or markup language format.


At block 210, the pre-breach system 130 requests a scan for identification information on respective consumers and/or employees from one or more data sources 100. Depending on the embodiment, data may be requested by the pre-breach system 130 from any number of public or private data sources 100. For example, data sources 100 may be in various risk categories, such as public internet, the Dark Web, social networks, sex offender databases, health care databases, fraud risk scoring systems, or any other type of data that may include consumer information.


In some embodiments the pre-breach system 130 requests data from other entities, such as social networking and sex offender database scanning entities, in addition to (or replacement to) scanning of certain data sources, e.g., the public internet, that may be performed by the pre-breach system 130. In one embodiment, the pre-breach system 130 scans one or more data sources 100 for information regarding individuals on the scan list from the requesting entity 110 in order to identify indications of potential data breaches of the requesting entity's data 110.


At block 220, the pre-breach system 130 performs or requests fraud risk scoring of the plurality of consumers. The fraud risk score may be generated based on customer or employee information provided by the requesting entity 110. For example, the customer information may be provided to a fraud score provider and, in return, the pre-breach system 130 may receive fraud scores for respective individuals. In one embodiment, fraud risk scores (or simply “fraud scores”) may be provided by Experian's Precise ID and/or other fraud risk analysis systems.


At block 230, the pre-breach system 130 generates and/or receives data breach risk score, such as for respective data breach risk categories. Depending on the embodiment, fewer and/or additional data breach categories than note above may be used.


Depending on the embodiment, the data breach risk scores may be based on a quantity of information located in the scan associated with individuals on the scan list and/or on one or more analytical models that analyze the information associated with the individuals that was located. For example, the type of information located at a particular data sources may affect how heavily weighted the information is in determined one or more risk scores for respective risk categories. For example, if only a last name and first name of multiple consumers are located within data source associated with a public internet risk category, such information may have little or no effect on a the risk score for that category. However, if more sensitive information of consumers is identified, such as Social Security number, driver's license number, etc., such information may have a larger effect on a breach risk score for the risk category. In some embodiments, scanning of the data from one or more data sources includes looking for information that is unique (or substantially unique) to the requesting entity. Location of such unique information, such as account numbers, may be a strong indicator that the consumer information located with that unique information was leaked from the particular requesting entity. Thus, location of information that is unique to a particular requesting entity may result in a large effect (or weighting) on a data breach risk score for the risk category from which the unique information was located. With reference to fraud risk scores, a risk score for the fraud risk category may be based on changes in risk scores of the individuals on the scan list from one or more previous scans.


At block 240, the pre-breach system 130 analyzes the data breach risk scores, any generated data breach risk scores, and/or other data obtained or determined in view of scanning the data sources. In one embodiment, the pre-breach system 130 may provide the requesting entity with an indication of whether there is a potential or actual breach in the requesting entity's consumer information. For example, an overall data breach risk score may be calculated based on one or more calculated category risk scores and/or fraud risk scores for the consumers. Thus, in one embodiment an overall data breach risk score may be provided to the requesting entity as an indicator of a likelihood that information of the entities customers and/or employees has been compromised. In some embodiments, the pre-breach system 130 may provide an indication of likelihood that any located information regarding individuals on the scan list was leaked from the requesting entity or from another entity. Such a likelihood may be determined based on matching of information unique to the requesting entity and/or a quantity of individuals on the scan list for which information is located on a particular data source, possibly in a same area of the data source or even in a same order as on the scan list. In other embodiments, additional information may be provided to the requesting entity, such as the individual risk scores for various risk categories and/or indications of changes in risk scores over time.


At block 250, the pre-breach system 130 provides results from the analysis of to the requesting entity 110. In one embodiment, the pre-breach system 130 generates one or more reports for access by the requesting entity 110 detailing the consumer information that was assessed. In another embodiment, the requesting entity 110 may choose which risk categories to view on its detailed report. In some embodiments, the pre-breach system 130 provides the requesting entity 110 with charts comparing the selected data breach risk scores between two or more scanning periods.



FIG. 3 is a flowchart illustrating one embodiment of a method of periodically receiving and/or determining risk scores and providing a comparative analysis of pre-breach risk to a requesting entity 110. In an embodiment, the method shown in FIG. 3 may be performed substantially in realtime so that the requesting entity 110 is presented with detailed reports containing information related to improvement in actual or potential data breaches without substantial delay. Depending on the embodiment, the method may be performed with fewer or additional blocks than are illustrated in FIG. 3. In one embodiment, the method of FIG. 3 is performed by the pre-breach system 130. However, the method may be performed by one or more other suitable computing systems, such as a computing system that includes data scanning and data breach risk scoring modules that perform similar features to those discussed with reference to the pre-breach system 130. For ease of discussion, the methods discussed below will be described with reference to the pre-breach system 130. However, the methods may be performed by any other suitable computing system.


The method of FIG. 3 describes a process of analyzing fraud risk scores for individuals on a scan list of a requesting entity and comparing the fraud risk scores of such consumers with previous fraud risk scores in order to develop a data breach risk score for a fraud risk category. The method of FIG. 3 may also be used for providing risk scores associated with other risk categories, such as by comparing a quantity of individuals for which match criteria for a particular risk category are met in a current month with a quantity met in a previous month in order to generate a risk score for the particular category.


In one embodiment, the pre-breach system 130 receives the fraud risk scores and accesses previous fraud risk scores generated for the requesting entity 110. In some embodiments, the periodically generated fraud risk scores are compared. The fraud risk scores may be compared to determine a percentage change in fraud risk scores (or other data breach categories) in each of one or more fraud risk score ranges, for example. In other embodiments, the fraud risk scores may be compared and converted into a risk score, such as a risk score that indicates a current fraud risk (e.g., cumulative across all the consumers) and/or a risk score that indicates a change in fraud risk scores over times, such as a comparison of a previous aggregate fraud risk score (e.g., average of fraud risk scores of all individuals on the scan list) with a current aggregate fraud risk score. Thus, in one embodiment, a data breach risk score for a fraud risk category may be calculated based on the change in fraud risk scores. In one embodiment, fraud risk scores are generated at least partially manually, such as by an individual. In other embodiments, fraud risk scores are generated at least partially automatically by a computing device.


In block 300, the pre-breach system 130 receives the generated fraud risk scores, such as may be provided by a third-party fraud risk scoring system, such as Experian's Precise ID, or other similar fraud risk analysis systems. In one embodiment, the pre-breach system 130 generates fraud risk scores for consumers and/or generates aggregate fraud risk scores reflecting fraud risk across a requesting entity (or at least the individuals included in the scan list from the requesting entity).


In block 310, the pre-breach system 130 accesses previous fraud risk scores for the requesting entity 110. The previous fraud risk scores may be stored locally on the pre-breach system 130, may be entered by the requesting entity 110, or may be maintained/retrieved from other sources.


In block 320, the pre-breach system 130 compares the newly generated fraud risk scores with fraud risk scores previously generated for the individuals on the scan list. For example, individuals may be segmented into fraud risk ranges, such as a low, medium, and high fraud risk range, and totals of consumers within each of the segments may be calculated. Changes in the quantity of consumers in each of the fraud risk segments may then be determined on a periodic basis in order to detect changes over time in fraud risks associated with the individuals on the scan list.


In block 330, the pre-breach system 130 generates a data breach risk score based on the change in fraud risk scores over a period of time, such as comparison of quantities of consumers within respective fraud risk score segments compared to quantities of consumers within those same fraud risk score segments in one or more months. In some embodiments, this data breach risk score can be a percentage value, rating, or another indicator.


In block 340, the pre-breach system 130 periodically updates a data breach risk score for a fraud risk category based on a frequency setting that may be selected by the requesting entity. The risk score may be provided in the form of real-time notifications (e.g., in response to detecting a change in data breach risk scores for the requesting entity 110) and/or batch reports that are periodically provided to the requesting entity 110. In one embodiment, month to month changes in the data retrieved (and or derived) may be reported, as well as (or as an alternative to) a summary of the information located and/or the raw data located. For example, month-to-month changes in fraud risk scores (e.g., changes in numbers of fraud risk scores in particular ranges) may be reported.


In one embodiment, a requesting entity can ask for a determination of whether there has been a breach rather than signing up for a month-to-month (or other periodic) comparison. Once an actual breach has been determined, the requesting entity can request that the breach be tracked to a data source which holds its employee/customer information. The requesting entity can then follow up with that source to figure out how to resolve the issue.


As noted above, the method of FIG. 3 may be performed in a similar manner to determine data breach risk scores for other data breach risk categories. For example, comparison of quantities of consumers matching criteria for respective risk categories may be compared on a period-to-period basis to determine data breach risk scores.


Sample Data Breach Risk Setup and Reporting



FIG. 4A illustrates an example user interface that allows a requesting entity 110 to select which data breach risk categories to monitor. Depending on the embodiment, different risk categories may be provided in the user interface. In the embodiment of FIG. 4A, the requesting entity is given an option to select specific risk categories (which each may be associated with one or more data sources) to include in a proactive data breach scanning service. In this embodiment, the requesting entity can select any combination of the indicated risk categories. In other embodiments, other risk categories may be provided.


In some embodiments, the risk categories may be associated with separate costs, such as cost per consumer scanned within a particular risk category. For example, the public Internet risk category scan may cost $0.02 per consumer, while a dark web scan may cost $0.04 per consumer. Thus, the requesting entity may select the most appropriate risk categories in view of costs associated with performing the scan.


In one embodiment, the cost per consumer, and/or a total cost for a particular risk category (e.g., based on the actual number of consumers in the scan list and the cost per consumer for the respective risk category) may be provided on a user interface such as that shown in FIG. 4A, e.g., so that the requesting entity can gauge a cost associated with each data category.



FIG. 4A also includes a frequency selection tool that allows the requesting entity to set a frequency at which scanning of the selected risk categories is to occur. In one embodiment, different frequencies may be selected for particular risk categories (or event for particular data sources with a risk category), such that data sources of some risk categories may be scanned more frequently than others.



FIG. 4B illustrates an example report 400 that may be provided to a requesting entity after a scan has been performed, either in an online user interface or in printed form. In this embodiment, the report includes information on each of the risk categories scanned, as well as an indication of additional available risk categories that were not scanned. In embodiment of FIG. 4B, the report indicates limited information regarding the consumer data that was located in each of the risk categories. For example, the report indicates that in public Internet risk category 30 consumer email addresses were found. In other embodiments, additional information regarding information of the consumers on the requesting entity's scan list may be provided. For example, the public Internet information may be selected (e.g., via a hyperlink) in order to access more detailed information regarding additional types of information located on the public Internet, where the information was located (e.g., specific Internet site/locations), what other information for the same individuals was located, how long information has been at those locations, etc. Similarly, more detailed information may be provided for each of the other risk categories.


In some embodiments, the report 500 includes data only in those risk categories that are scanned for the requesting entity, such as those risk categories that are selected using a user interface similar to FIG. 4A. Thus, if a particular requesting entity is not the healthcare space, that requesting entity can view a report that does not include information regarding the healthcare risk category.



FIG. 5 illustrates a report 500 that is similar to the report 400 of FIG. 4B, but with additional information regarding changes in located consumer information in each of the data breach categories. In particular, the example of FIG. 5 illustrates respective changes 510 of matching data points in a current period over matches located in a previous period for particular data breach risk categories. In this embodiment, the change indicators are presented in the form of percentages, but in other embodiments change information may be expressed in other manners, such as letters scores, or scores of other numerical ranges.


In other embodiments, the requesting entity 110 can customize how many previous periods or which specific periods it wishes the pre-breach system 130 to access. For example, a requesting entity can choose to view the change in its consumer information found through the public internet over a period of three month (e.g., rather than a default period of one month). In one embodiment, the user interface includes controls that allow the requesting entity to adjust the data shown to reflect less or additional data and/or to provide risk scores in different formats. Thus, the displayed data breach risk scores and/or reports may be customized by the requesting entity 110.



FIG. 6 is a user interface that may be provided as a detailed report for a requesting entity 110 accessing its pre-data breach monitoring information. The user interface illustrated in FIG. 6 may be provided to the requesting entity 110 in response to selection of the Fraud Risk heading in a summary report, such as those of FIGS. 4B and 5. Alternatively, the user interface illustrated in FIG. 6 may be presented to the requesting entity in other manners.


In the embodiment of FIG. 6, data regarding various personal information types of consumers is indicated. In other embodiments, other information may be displayed. In FIG. 6, information regarding Social Security numbers, phone numbers, and names/addresses of consumers of individuals on the scan list is included in the user interface. The example information provides data points for a current period (e.g., “this period”), a previous period (e.g., “Last period), and a percentage change between the two periods. In this example report, information regarding social security numbers includes an average number of times each monitored social security number was used, as well as an average number of business entities at which those Social Security numbers were used. In the example data illustrated in FIG. 6, both the number of times monitored Social Security numbers were used, as well as the number of business entities at which Social Security numbers were used has decrease from the previous period, 0.53% and 8.33% respectively. Thus, this information may serve as a positive indication that any data breach means taken by the requesting entity are effective. In one embodiment, the requesting entity may obtain further information regarding information on the report, such as through one or more hyperlinks or other control means. For example, in one embodiment the requesting entity may be provided with a report listing the actual businesses at which Social Security numbers of the monitored individuals was located.


In the embodiment of FIG. 6, the Social Security number information also includes information regarding related information used with located monitored Social Security numbers. In particular, the user interface indicates a number of phone numbers different from monitored phone numbers of the corresponding monitored Social Security numbers. Thus, this data may provide an indication of Social Security numbers being used with other individuals (e.g., other phone numbers of fraudsters, for example). Similar comparisons of uses of other monitored consumer data in connection with monitored Social Security numbers is provided.


In FIG. 6, similar information to that illustrated in the Social Security number section is also provided with reference to phone number and name and address of monitored individuals. In other embodiments, other data items may be displayed in a similar manner.


In one embodiment, the results from the periodically generated fraud risk scores may be displayed on a chart 600 demonstrating the comparison of fraud risk scores in a current period compared to a previous period. In FIG. 6, the chart 600 displays a positive change in the fraud risk scores of individuals on a scan list from the requesting entity 110. In this particular chart, the vertical axis represents a percentage change in quantity of consumers with a particular fraud score, wherein fraud scores range from 1-10. Thus, the chart 600 indicates that compared to a previous period, in the current period there are about 4% less consumers that have a fraud score of 5 and about 5% more consumers that have a fraud score of 10. In this embodiment, higher fraud scores indicate decreased risk of fraud associated with the monitored individuals.


In other embodiments, fraud risk scores that are higher may indicate an increased risk of fraud. In other embodiments, changes in fraud risk scores (and/or other data breach risk scores) may be illustrated in different manners.


In other embodiments, the chart 600 may show another data breach risk category which has been selected by the requesting entity 110. Depending on the embodiment, the information provided in the chart 600 may be customized, such as by the data sources 100 scanned or the data breach risk categories selected by the requesting entity 110.


The chart 600 allows the requesting entity 110 to easily determine its progress in data breach protection and monitoring over a period of time. By examining the detailed report and the chart 600 in FIG. 6, the requesting entity 110 is able to determine that measures it has taken to prevent or remedy data breaches over a period of time are successful.



FIG. 7 is a user interface that may be provided as a detailed report for a requesting entity 110 accessing its pre-data breach monitoring information. Similar to FIG. 6, the consumer information accessed and scanned by the pre-breach system 130 included social security numbers, phone numbers, names, and addresses of the requesting entity's 100 consumers.


Similar to chart 600 (FIG. 6), chart 700 illustrates comparison of data breach risk scores between a current period and previous period. In FIG. 7, the chart 700 displays a negative change in the data breach risk score of the requesting entity 110. For example, the chart 700 indicates that there is about 19% more consumers that have a fraud score of one than in a previous period, while there are about 10% fewer consumers with a fraud score of 10 than in a previous period. In this embodiment, lower fraud scores indicate an increased risk of fraud associated with the consumers. In addition, different score ranges may be used in other embodiments, such as a range from 1-999, such as is illustrated in FIG. 8, for example.


The chart 700 allows the requesting entity 110 to determine its progress in data breach protection and monitoring over a period of time. By examining the detailed report and the chart 700 in FIG. 7, the requesting entity 110 may be able to determine that measures it has taken to prevent or remedy data breaches over a period of time have not been successful. The requesting entity 110 may also be able to determine that further measures need to be taken to improve its data breach risk scores and/or preventative measures taken to protect its data.



FIG. 8 illustrates a chart displaying the data breach risk scores comparing fraud risk scores for a scan list of employees. In this embodiment, the risk scores received for respective employees (e.g. from a third-party fraud scoring system) are segmented into groups each covering a range of 100. In the example of FIG. 8, the segment with the most employees is fraud scores from 401-500, with similar numbers of employees in fraud score ranges 301-400 and 501-600. Importantly, the chart of FIG. 8 illustrates changes in the quantities of employees within each of the segments from a previous period (e.g. a previous month or quarter when fraud scores were last obtained for the employees or a previous scan selected by the requesting entity). In the particular example of FIG. 8, the number of employees with fraud scores in the 401-500 range is increased in the current period, but the number of employees within fraud score ranges 501-600 and 801-900 has decreased in the current period. Depending on the embodiment, the pre-breach system 130 may generate one or more scores based on the comparison of previous and current period results. Additionally, more historical data may be provided, such as two or more previous periods being illustrated on the chart of FIG. 8.


Other types of graphics illustrating historical comparisons of fraud scores (and/or other data breach risk scores as discussed herein) may be provided also, such as a historical graph illustrating quantity of consumers within a 701-999 segment of fraud scores over a period of one year.



FIG. 9A-D illustrate different data breach risk category comparisons. In FIG. 9A, the chart displays the number of customers who have healthcare records available within the scanned data sources 100. This chart shows an increase in the number of customers who have healthcare records available in data sources, which demonstrates that the requesting entity 110 has either not taken measures to fix an actual data breach or the measures it has taken are not successful in preventing a breach. As shown in FIG. 9A, the number of customers having from 1-5 healthcare records identified in one or more healthcare data sources scanned by the pre-breach system has increased from 28 in the previous period to 32 in the current period. Similarly, the number of customers having 6-10 healthcare records identified increased from 25 in the previous period 230 in the current period.


In FIG. 9B, the chart displays the number of customers who have identifying information available through social media sites within the scanned data sources 100. This chart shows an increase in the number of customers who have social media data points available in data sources 100, which demonstrates that the requesting entity 110 has either not taken measures to fix an actual data breach or the measures it has taken are not successful in preventing a breach.


Depending on the embodiment, the number of social media uses may include uses of only certain types of consumer data and/or combinations of consumer data. For example, use of a consumer's name only may not be counted as a social media use in one embodiment, while use of a consumer's name and home address (or email address, phone number, and/or other items) may be counted as a social media use. Depending on the embodiment, the requesting entity may define rules for classifying data associated with customers/employees as hits that are to be included in the reporting analysis. Thus, a first requesting entity may determine that uses of only a consumer's first and last name should be counted in social media uses, while another requesting entity may determine that uses of only a consumer's first and last name should not be counted as social media uses.


In FIG. 9C, the chart displays the number of customers who have identifying information available through the public internet within the scanned data sources 100. This chart shows an increase in the number of customers who have public internet search data points available in data sources 100, which demonstrates that the requesting entity 110 has either not taken measures to fix an actual data breach or the measures it has taken are not successful in preventing a breach.


In FIG. 9D, the chart displays the number of consumer social security number uses found within the data breach category of the Dark Web. This chart shows an increase in the number of customers who have Dark Web data points available in data sources 100, which demonstrates that the requesting entity 110 has either not taken measures to fix an actual data breach or the measures it has taken are not successful in preventing a breach.


As noted above with reference to FIG. 9B, the criteria for counting location of consumer information in one or more of the data breach risk categories may be customized by a requesting entity and/or the pre-breach system.


Badges



FIG. 10 illustrates a webpage of a requesting entity 110 that has requested and completed data breach monitoring through the pre-breach system 130. In some embodiments, once data breach risk score(s) of the requesting entity 110 are determined, it may be awarded a badge 600 corresponding to its level of active measures taken to remedy or prevent data breaches. In some embodiments, information provided by the requesting entity to a provider of the pre-breach system may be manually analyzed in order to determine if the requesting entity should be provided with a badge. For example, remediation information (e.g., steps take to resolve issues with consumer data that may have been leaked from the requesting entity) may be provided to the provider of the pre-breach system for manual (or automatic) review in determine whether a badge should be provided to the requesting entity (and possible particular badge that should be provided)


The badge 600 may also be awarded based on the change in one or more risk scores and/or overall risk scores. For example, a bronze badge may represent that the requesting entity 110 has a 5% decrease in its consumer information available within data sources 100, while a silver badge represents a 10% decrease and a gold badge represents a 20% or higher decrease. Thus, a badge may be placed on a requesting entity's website and/or other marketing materials, in order to signify that the requesting entity is taking appropriate care in monitoring for potential breaches of its customers and/or employees personal data.


In one embodiment, determining whether a badge should be provided to a requesting entity, or which badge should be provided, may be based on a comparison of risk scores of the requesting entity to risk scores of other entities, such as entities within the same or similar vertical market, having a similar number of employees, within a similar geographic region, or the like. For example, a relatively high public internet risk score for a particular requesting entity may not have a negative impact on the determination of a badge to provide to the requesting entity if the risk score is much lower than public internet risk scores for other entities within the same vertical market. Similarly, a low overall risk score for an entity (e.g., based on multiple category risk scores) may weigh against award of a badge if that low overall risk score is higher than overall risk scores for similar types of companies (e.g., similar vertical market).


Badges may encourage additional engagement by customers in view of a perceived sense of security provided by the requesting entity proactively monitoring for potential data breaches that is expressed by be badges. In some embodiments, qualifications for having a badge on a requesting entity's website may need to be periodically confirmed, such as in response to a monthly or quarterly scanning of data sources against the requesting entity's customer list and/or providing information to the provider of the pre-breach system regarding steps taken to reduce data breaches.


In one embodiment, the badge icon is obtained via a hyperlink to the data breach entity, which provides the appropriate badge for placement on the webpage when accessed by a consumer in view of most recent data breach risk scores (e.g. in comparison with previous data breach risk scores of the requesting entity). Thus, in this embodiment the level of actions taken by the requesting entity in detecting and remediating data breaches may be updated automatically and up-to-date badges may be provided in order to further encourage consumers to interface with the requesting entity. In some embodiments, badges may be entirely revoked/removed when there has been a failure to continue taking appropriate measures to prevent or remedy data breaches. The awarding of a badge may be determined manually in part or automatically by a computing system.



FIG. 11 illustrates one embodiment of a pre-breach system 130 that is configured to provide information to businesses on potential risks of data breaches, even prior to a full-blown data breach. In the embodiment of FIG. 11, the pre-breach system 130 includes a data scanning module 165 that is configured to query one or more data providers, either local data providers or remote data providers, in order to identify consumer information of a business that has requested pre-breach processing. As shown in FIG. 11, a requesting entity 110 stores, either locally or remotely, information of customers (in customer data store 105) and/or information of employees (in employee data store 115). Such information may be susceptible to data breaches. However, until a data breach has occurred, the requesting entity 110 may have no idea how likely it is that its customers and/or employees information may be fraudulently accessed.


The pre-breach system of FIG. 11 includes three modules that are configured to provide early breach notifications to businesses. First, a data scanning module 165 is configured to receive data from and/or otherwise scan data sources for information regarding customers of the requesting entity 110 in order to identify indications of potential data breaches of the business' data. In one embodiment, the business provides the data scanning module 165 with information regarding customers so that the data scanning module 165 can identify potential misuses of those customers information. Consumer information may include, for example, one or more of: Last Name, First Name, Middle Name, Generation Code, Social Security Number, Date of Birth, Phone Number, Drivers' License, State, Drivers' License Number, Street Address, City Name, State, Zip Code, account number or other custom data associated with an account of the consumer with the requesting entity, Credit card number, credit data, Email, and/or any other data. The data scanning module 165 may then scan multiple data sources, including public and/or private data sources, to identify possible leaks of the consumer information that is indicative of an actual or potential data breach. Scanning may be performed on employee data in a similar manner.


The data breach risk score module 150 is configured to generate data breach risk scores for customers of the requesting entity 110, such as based on information provided by the requesting entity 110 regarding customers (and/or employees) and/or additional information (e.g., credit data) obtained regarding those individuals. In one embodiment, fraud risk scores (which may be used in generation of a data breach risk score for a fraud category) are provided by Experian's Precise ID product and/or are similar to those data breach risk scores.


The report generation module 145 analyzes the data of the data scanning module 165 and/or the data breach risk score module 150 and generates one or more reports to the requesting entity 110. Reports may be in the form of real-time notifications (e.g., in response to detecting a change in data breach risk for the requesting entity 110) and/or batch reports that are periodically provided to the requesting entity 110. In one embodiment, month to month changes in the data retrieved (and or derived) may be reported, as well as (or as an alternative to) a summary of the information located and/or the raw data located. For example, month-to-month changes in data breach risk scores (e.g., changes in numbers of data breach risk scores in particular ranges) may be reported.


Example Computing System


The pre-breach system 130 includes, for example, a personal computer that is IBM, Macintosh, or Linux/Unix compatible or a server or workstation. In one embodiment, the pre-breach system 130 comprises a server, a laptop computer, a cell phone, a personal digital assistant, a kiosk, or an audio player, for example. In one embodiment, the exemplary pre-breach system 130 includes one or more central processing unit (“CPU”) 155, which may each include a conventional or proprietary microprocessor.


The pre-breach system 130 further includes one or more mass storage devices 135, such as a hard drive, diskette, solid state drive, or optical media storage device. Typically, the modules of the pre-breach system 130 are connected to the computer using a standard based bus system. In different embodiments, the standard based bus system could be implemented in Peripheral Component Interconnect (“PCI”), Microchannel, Small Computer System Interface (“SCSI”), Industrial Standard Architecture (“ISA”) and Extended ISA (“EISA”) architectures, for example. In addition, the functionality provided for in the components and modules of the locator system 100 may be combined into fewer components and modules or further separated into additional components and modules.


The pre-breach system 130 is generally controlled and coordinated by operating system software, such as Windows XP, Windows Vista, Windows 7, Windows Server, Unix, Linux, SunOS, Solaris, or other compatible operating systems. In Macintosh systems, the operating system may be any available operating system, such as MAC OS X. In other embodiments, the pre-breach system 130 may be controlled by a proprietary operating system. Conventional operating systems control and schedule computer processes for execution, perform memory management, provide file system, networking, I/O services, and provide a user interface, such as a graphical user interface (“GUI”), among other things.


The pre-breach system 130 may include one or more commonly available input/output (I/O) devices and interfaces 160, such as a keyboard, mouse, touchpad, and printer. In one embodiment, the I/O devices and interfaces 160 include one or more display devices, such as a monitor, that allows the visual presentation of data to a user. More particularly, a display device provides for the presentation of GUIs, application software data, and multimedia presentations, for example. The pre-breach system 130 may also include one or more multimedia devices 140, such as speakers, video cards, graphics accelerators, and microphones, for example.


In the embodiment of FIG. 11, the I/O devices and interfaces 160 provide a communication interface to various external devices. In the embodiment of FIG. 11, the pre-breach system 130 is electronically coupled to a network 120, which comprises one or more of a LAN, WAN, and/or the Internet, for example, via a wired, wireless, or combination of wired and wireless, communication link. The network 120 communicates with various computing devices and/or other electronic devices via wired or wireless communication links.


According to FIG. 11, information is provided to the pre-breach system 130 over the network 120 from one or more data sources 100. The data sources 100 may include one or more internal and/or external data sources. In some embodiments, one or more of the databases or data sources may be implemented using a relational database, such as Sybase, Oracle, CodeBase and Microsoft® SQL Server as well as other types of databases such as, for example, a flat file database, an entity-relationship database, and object-oriented database, and/or a record-based database.


In the embodiment of FIG. 11, the pre-breach system 130 also includes modules 145, 150, and 165 that may be stored in the mass storage device 135 as executable software codes that are executed by the CPU 155. These modules may include, by way of example, components, such as software components, object-oriented software components, class components and task components, processes, functions, attributes, procedures, subroutines, segments of program code, drivers, firmware, microcode, circuitry, data, databases, data structures, tables, arrays, and variables. In the embodiment shown in FIG. 11, the pre-breach system 130 is configured to execute the modules 145, 150, and 165 in order to monitor online data to predict or determine a risk of data breach, as well as any other functionality described elsewhere in this specification.


In general, the word “module,” as used herein, refers to logic embodied in hardware or firmware, or to a collection of software instructions, possibly having entry and exit points, written in a programming language, such as, for example, Java, Lua, C or C++. A software module may be compiled and linked into an executable program, installed in a dynamic link library, or may be written in an interpreted programming language such as, for example, BASIC, Perl, or Python. It will be appreciated that software modules may be callable from other modules or from themselves, and/or may be invoked in response to detected events or interrupts. Software modules configured for execution on computing devices may be provided on a computer readable medium, such as a compact disc, digital video disc, flash drive, or any other tangible medium. Such software code may be stored, partially or fully, on a memory device of the executing computing device, such as the pre-breach system 130, for execution by the computing device. Software instructions may be embedded in firmware, such as an EPROM. It will be further appreciated that hardware modules may be comprised of connected logic units, such as gates and flip-flops, and/or may be comprised of programmable units, such as programmable gate arrays or processors. The modules described herein are preferably implemented as software modules, but may be represented in hardware or firmware. Generally, the modules described herein refer to logical modules that may be combined with other modules or divided into sub-modules despite their physical organization or storage.

Claims
  • 1. A computer-implemented method of monitoring online data to predict risk for data breach, the method comprising: receiving a scan list comprising information regarding a plurality of individuals;periodically automatically scanning a plurality of data sources for information regarding the plurality of individuals on the scan list, wherein the plurality of data sources that are automatically scanned include dark web data sources that are accessible via particular browsing software, wherein automatically scanning the dark web data sources comprises: executing a particular browser that is configured to access dark address space that is not accessible via a standard browser configured to access public internet data sources; andscanning at least a subset of the dark address space accessed via execution of the particular browser for at least a portion of data regarding the plurality of individuals on the scan list;identifying a quantity of located data regarding the individuals across the plurality of data sources;determining a difference between the quantity of located data and a quantity of located data identified in one or more previous scans of the plurality of data sources;generating a data breach risk score based at least in part on the differences between the quantity of located data and the quantity of located data identified in the one or more previous scans; andin response to determining that the difference between the quantity of located data and the previous quantity of data exceeds a threshold, providing a notification of a potential data breach.
  • 2. The computer-implemented method of claim 1, wherein the plurality of individuals are associated with a company.
  • 3. The computer-implemented method of claim 1, wherein the plurality of data sources further comprise the public internet data sources.
  • 4. The computer-implemented method of claim 1, wherein the dark web data sources are only accessible via the particular browsing software.
  • 5. The computer-implemented method of claim 1, wherein the notification comprises a data breach fraud score over time.
  • 6. The computer-implemented method of claim 1, wherein identifying the quantity of the located data is for each of a plurality of data breach risk categories, and determining the difference is for each of the plurality of data breach risk categories.
  • 7. The computer-implemented method of claim 6, wherein the data breach risk categories include at least one of: public internet, dark web, social media sites, sex offender databases, heath care, fraudulent activity sites, or fraud risk score.
  • 8. The computer-implemented method of claim 1, wherein the method further comprises: periodically automatically scanning the plurality of data sources with respect to other individuals associated with each of a plurality of other companies, wherein the plurality of other companies are similar to the company in one or more categories, the one or more categories comprising at least one of a vertical market, a number of employees, or a geographic region; andcomparing the data breach risk score for the company to data breach risk scores determined for the plurality of other companies that are similar to the company.
  • 9. The computer-implemented method of claim 1, wherein the method further comprises: tracking the potential data breach to a particular data source holding a portion of data associated with one or more of the individuals on the scan list.
  • 10. The computer-implemented method of claim 1, wherein the method further comprises: tracking the potential data breach over time, and in response to determining that a change to the data breach risk score exceeds a threshold, generate another notification indicative of the change.
  • 11. The computer-implemented method of claim 10, wherein generating a data breach risk score comprises applying weights to different categories of information.
  • 12. A computing system comprising: memory; anda hardware processor configured to execute computer-executable instructions to: receive a scan list comprising information regarding a plurality of individuals;periodically automatically scan a plurality of data sources for information regarding the plurality of individuals on the scan list, wherein the plurality of data sources that are automatically scanned include dark web data sources that are accessible via particular browsing software, wherein automatically scanning the dark web data sources comprises: executing a particular browser that is configured to access dark address space that is not accessible via a standard browser configured to access public internet data sources; andscanning at least a subset of the dark address space accessed via execution of the particular browser for at least a portion of data regarding the plurality of individuals on the scan list;identify a quantity of located data regarding the individuals across the plurality of data sources;determine a difference between the quantity of located data and a quantity of located data identified in one or more previous scans of the plurality of data sources;generate a data breach risk score based at least in part on the differences between the quantity of located data and the quantity of located data identified in the one or more previous scans; andin response to determining that the difference between the quantity of located data and the previous quantity of data exceeds a threshold, provide a notification of a potential data breach.
  • 13. The computing system of claim 12, wherein generating the data breach risk score comprises determining a plurality of data breach category risk scores that are each associated with a different data breach risk category of the data breach risk categories.
  • 14. The computing system of claim 13, wherein a first of the plurality of data breach risk categories is associated with the public internet data sources, and wherein a second of the plurality of data breach risk categories is associated with the dark web data sources.
  • 15. The computing system of claim 13, wherein a third of the plurality of data breach risk categories is associated with social media sources.
  • 16. The computing system of claim 13, wherein the data breach risk score is an average of the plurality of data breach category risk scores.
  • 17. The computing system of claim 13, wherein a first of the plurality of data breach category risk scores is weighted more heavily in determining the data breach risk score than a second of the plurality of data breach category risk scores.
  • 18. A non-transitory computer storage medium which stores executable code, the executable code causing a computing device to perform operations that comprise at least: receiving a scan list comprising information regarding a plurality of individuals;periodically automatically scanning a plurality of data sources for information regarding the plurality of individuals on the scan list, wherein the plurality of data sources that are automatically scanned include dark web data sources that are accessible via particular browsing software, wherein automatically scanning the dark web data sources comprises: executing a particular browser that is configured to access dark address space that is not accessible via a standard browser configured to access public internet data sources; andscanning at least a subset of the dark address space accessed via execution of the particular browser for at least a portion of data regarding the plurality of individuals on the scan list;identifying a quantity of located data regarding the individuals across the plurality of data sources;determining a difference between the quantity of located data and a quantity of located data identified in one or more previous scans of the plurality of data sources;generating a data breach risk score based at least in part on the differences between the quantity of located data and the quantity of located data identified in the one or more previous scans; andin response to determining that the difference between the quantity of located data and the previous quantity of data exceeds a threshold, providing a notification of a potential data breach.
  • 19. The non-transitory computer storage medium of claim 18, wherein the operations further comprise: providing a company associated with the plurality of individuals with an option to present a badge on a webpage provided by the company, the badge indicating that the company has taken measures to reduce risks of data breach in association with the periodically automatically scanning of the plurality of data sources.
  • 20. The non-transitory computer storage medium of claim 18, wherein generating the data breach risk score comprises determining a plurality of data breach category risk scores that are each associated with a different data breach risk category of the data breach risk categories.
CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. application Ser. No. 16/657,057, filed Oct. 18, 2019, which is a continuation of U.S. application Ser. No. 13/665,636, filed Oct. 31, 2012, which claims the benefit of U.S. Provisional Application No. 61/553,761, filed on Oct. 31, 2011, the disclosures of which are hereby incorporated by reference in their entirety.

US Referenced Citations (1296)
Number Name Date Kind
2074513 Mills Mar 1937 A
3316395 Lavin et al. Apr 1967 A
3752904 Waterbury Aug 1973 A
4163290 Sutherlin et al. Jul 1979 A
5274547 Zoffel et al. Dec 1993 A
5323315 Highbloom Jun 1994 A
5386104 Sime Jan 1995 A
5414833 Hershey et al. May 1995 A
5454030 de Oliveira et al. Sep 1995 A
5504675 Cragun et al. Apr 1996 A
5563783 Stolfo et al. Oct 1996 A
5590038 Pitroda Dec 1996 A
5627886 Bowman May 1997 A
5640577 Scharmer Jun 1997 A
5659731 Gustafson Aug 1997 A
5666528 Thai Sep 1997 A
5679940 Templeton et al. Oct 1997 A
5696907 Tom Dec 1997 A
5696965 Dedrick Dec 1997 A
5739512 Tognazzini Apr 1998 A
5742775 King Apr 1998 A
5745654 Titan Apr 1998 A
5752242 Havens May 1998 A
5754632 Smith May 1998 A
5754939 Herz et al. May 1998 A
5774692 Boyer et al. Jun 1998 A
5774868 Cragun et al. Jun 1998 A
5793497 Funk Aug 1998 A
5797136 Boyer et al. Aug 1998 A
5809478 Greco et al. Sep 1998 A
5812840 Shwartz Sep 1998 A
5819226 Gopinathan et al. Oct 1998 A
5819260 Lu et al. Oct 1998 A
5822741 Fischthal Oct 1998 A
5822750 Jou et al. Oct 1998 A
5825884 Zdepski et al. Oct 1998 A
5828837 Eikland Oct 1998 A
5832068 Smith Nov 1998 A
5842178 Giovannoli Nov 1998 A
5844218 Kawan et al. Dec 1998 A
5870721 Norris Feb 1999 A
5872921 Zahariev et al. Feb 1999 A
5878403 DeFrancesco Mar 1999 A
5879297 Haynor et al. Mar 1999 A
5884289 Anderson et al. Mar 1999 A
5893090 Friedman et al. Apr 1999 A
5912839 Ovshinsky et al. Jun 1999 A
5913196 Talmor et al. Jun 1999 A
5943666 Kleewein et al. Aug 1999 A
5950179 Buchanan et al. Sep 1999 A
5956693 Geerlings Sep 1999 A
5961593 Gabber et al. Oct 1999 A
5963932 Jakobsson et al. Oct 1999 A
5987440 O'Neil et al. Nov 1999 A
5999907 Donner Dec 1999 A
5999940 Ranger Dec 1999 A
6023694 Kouchi et al. Feb 2000 A
6029139 Cunningham et al. Feb 2000 A
6029149 Dykstra et al. Feb 2000 A
6029154 Pettitt Feb 2000 A
6029194 Tilt Feb 2000 A
6038551 Barlow et al. Mar 2000 A
6044357 Garg Mar 2000 A
6055570 Nielsen Apr 2000 A
6073106 Rozen et al. Jun 2000 A
6073140 Morgan et al. Jun 2000 A
6094643 Anderson et al. Jul 2000 A
6119103 Basch et al. Sep 2000 A
6125985 Amdahl et al. Oct 2000 A
6142283 Amdahl et al. Nov 2000 A
6144957 Cohen et al. Nov 2000 A
6144988 Kappel Nov 2000 A
6157707 Baulier et al. Dec 2000 A
6182219 Feldbau et al. Jan 2001 B1
6208720 Curtis et al. Mar 2001 B1
6223171 Chaudhuri et al. Apr 2001 B1
6249228 Shirk et al. Jun 2001 B1
6253202 Gilmour Jun 2001 B1
6253203 O'Flaherty et al. Jun 2001 B1
6254000 Degen et al. Jul 2001 B1
6263447 French et al. Jul 2001 B1
6269349 Aieta et al. Jul 2001 B1
6282658 French et al. Aug 2001 B2
6285983 Jenkins Sep 2001 B1
6285987 Roth et al. Sep 2001 B1
6292795 Peters et al. Sep 2001 B1
6304869 Moore et al. Oct 2001 B1
6311169 Duhon Oct 2001 B2
6317783 Freishtat et al. Nov 2001 B1
6321339 French et al. Nov 2001 B1
6330546 Gopinathan et al. Dec 2001 B1
6339769 Cochrane et al. Jan 2002 B1
6366903 Agrawal et al. Apr 2002 B1
6397197 Gindlesperger May 2002 B1
6418436 Degen et al. Jul 2002 B1
6424956 Werbos Jul 2002 B1
6448889 Hudson Sep 2002 B1
6456984 Demoff et al. Sep 2002 B1
6457012 Jatkowski Sep 2002 B1
6463533 Calamera et al. Oct 2002 B1
6496819 Bello et al. Dec 2002 B1
6496936 French et al. Dec 2002 B1
6505193 Musgrave et al. Jan 2003 B1
6510415 Talmor et al. Jan 2003 B1
6513018 Culhane Jan 2003 B1
6523041 Morgan et al. Feb 2003 B1
6532459 Berson Mar 2003 B1
6542894 Lee et al. Apr 2003 B1
6543683 Hoffman Apr 2003 B2
6553495 Johansson et al. Apr 2003 B1
6571334 Feldbau et al. May 2003 B1
6574623 Laung et al. Jun 2003 B1
6581059 Barrett et al. Jun 2003 B1
6597775 Lawyer et al. Jul 2003 B2
6601173 Mohler Jul 2003 B1
6612488 Suzuki Sep 2003 B2
6615193 Kingdon et al. Sep 2003 B1
6658393 Basch et al. Dec 2003 B1
6662023 Helle Dec 2003 B1
6696941 Baker Feb 2004 B2
6700220 Bayeur et al. Mar 2004 B2
6714918 Hillmer et al. Mar 2004 B2
6735572 Landesmann May 2004 B2
6740875 Ishikawa et al. May 2004 B1
6748426 Shaffer et al. Jun 2004 B1
6751626 Brown et al. Jun 2004 B2
6754665 Futagami et al. Jun 2004 B1
6766946 Iida et al. Jul 2004 B2
6796497 Benkert et al. Sep 2004 B2
6804346 Mewhinney Oct 2004 B1
6811082 Wong Nov 2004 B2
6829711 Kwok et al. Dec 2004 B1
6845448 Chaganti et al. Jan 2005 B1
6850606 Lawyer et al. Feb 2005 B2
6850895 Brodersen et al. Feb 2005 B2
6857073 French et al. Feb 2005 B2
6866586 Oberberger et al. Mar 2005 B2
6871287 Ellingson Mar 2005 B1
6873979 Fishman et al. Mar 2005 B2
6898574 Regan May 2005 B1
6907408 Angel Jun 2005 B2
6908030 Rajasekaran et al. Jun 2005 B2
6910624 Natsuno Jun 2005 B1
6913194 Suzuki Jul 2005 B2
6918038 Smith et al. Jul 2005 B1
6920435 Hoffman et al. Jul 2005 B2
6928546 Nanavati et al. Aug 2005 B1
6930707 Bates et al. Aug 2005 B2
6934849 Kramer et al. Aug 2005 B2
6934858 Woodhill Aug 2005 B2
6950858 Ogami Sep 2005 B2
6965881 Brickell et al. Nov 2005 B1
6965997 Dutta Nov 2005 B2
6973462 Dattero et al. Dec 2005 B2
6973575 Arnold Dec 2005 B2
6983379 Spalink et al. Jan 2006 B1
6983381 Jerdonek Jan 2006 B2
6983882 Cassone Jan 2006 B2
6985887 Sunstein et al. Jan 2006 B1
6988085 Hedy Jan 2006 B2
6991174 Zuili Jan 2006 B2
6993659 Milgramm et al. Jan 2006 B2
7003504 Angus et al. Feb 2006 B1
7007174 Wheeler et al. Feb 2006 B2
7028052 Chapman et al. Apr 2006 B2
7035855 Kilger et al. Apr 2006 B1
7046139 Kuhn et al. May 2006 B2
7050989 Hurt et al. May 2006 B1
7069240 Spero et al. Jun 2006 B2
7082435 Guzman et al. Jul 2006 B1
7083090 Zuili Aug 2006 B2
7089592 Adjaoute et al. Aug 2006 B2
7092891 Maus et al. Aug 2006 B2
7104444 Suzuki Sep 2006 B2
7158622 Lawyer et al. Jan 2007 B2
7162640 Heath et al. Jan 2007 B2
7174335 Kameda Feb 2007 B2
7185016 Rasmussen Feb 2007 B1
7188078 Arnett et al. Mar 2007 B2
7200602 Jonas Apr 2007 B2
7203653 McIntosh Apr 2007 B1
7212995 Schulkins May 2007 B2
7222779 Pineda-Sanchez et al. May 2007 B1
7225977 Davis Jun 2007 B2
7234156 French et al. Jun 2007 B2
7234160 Vogel et al. Jun 2007 B2
7240059 Bayliss et al. Jul 2007 B2
7240363 Ellingson Jul 2007 B1
7246067 Austin et al. Jul 2007 B2
7246740 Swift et al. Jul 2007 B2
7249048 O'Flaherty Jul 2007 B1
7254560 Singhal Aug 2007 B2
7263506 Lee et al. Aug 2007 B2
7272591 Ghazal et al. Sep 2007 B1
7272728 Pierson et al. Sep 2007 B2
7272857 Everhart Sep 2007 B1
7277869 Starkman Oct 2007 B2
7277875 Serrano-Morales et al. Oct 2007 B2
7277900 Ganesh et al. Oct 2007 B1
7283974 Katz et al. Oct 2007 B2
7289607 Bhargava et al. Oct 2007 B2
7290704 Ball et al. Nov 2007 B1
7298873 Miller, Jr. et al. Nov 2007 B2
7310743 Gagne et al. Dec 2007 B1
7314162 Carr et al. Jan 2008 B2
7314167 Kiliccote Jan 2008 B1
7330871 Barber Feb 2008 B2
7333635 Tsantes et al. Feb 2008 B2
7340042 Cluff et al. Mar 2008 B2
7343149 Benco Mar 2008 B2
7356516 Richey et al. Apr 2008 B2
7370044 Mulhern et al. May 2008 B2
7370351 Ramachandran et al. May 2008 B1
7373335 Cleghorn et al. May 2008 B2
7376618 Anderson et al. May 2008 B1
7383227 Weinflash et al. Jun 2008 B2
7383988 Slonecker, Jr. Jun 2008 B2
7386448 Poss et al. Jun 2008 B1
7386506 Aoki et al. Jun 2008 B2
7392534 Lu et al. Jun 2008 B2
7395273 Khan et al. Jul 2008 B2
7398915 Pineda-Sanchez et al. Jul 2008 B1
7403942 Bayliss Jul 2008 B1
7406715 Clapper Jul 2008 B2
7412228 Barclay et al. Aug 2008 B2
7418431 Nies et al. Aug 2008 B1
7421442 Gelb et al. Sep 2008 B2
7424439 Fayyad et al. Sep 2008 B1
7428509 Klebanoff Sep 2008 B2
7433855 Gavan et al. Oct 2008 B2
7433864 Malik Oct 2008 B2
7438226 Helsper et al. Oct 2008 B2
7444518 Dharmarajan et al. Oct 2008 B1
7451113 Kasower Nov 2008 B1
7457401 Lawyer et al. Nov 2008 B2
7458508 Shao et al. Dec 2008 B1
7460857 Roach, Jr. Dec 2008 B2
7466235 Kolb et al. Dec 2008 B1
7467127 Baccash et al. Dec 2008 B1
7467401 Cicchitto Dec 2008 B2
7478157 Bohrer et al. Jan 2009 B2
7480631 Merced et al. Jan 2009 B1
7481363 Zuili Jan 2009 B2
7490052 Kilger et al. Feb 2009 B2
7490356 Lieblich et al. Feb 2009 B2
7497374 Helsper et al. Mar 2009 B2
7509117 Yum Mar 2009 B2
7512221 Toms Mar 2009 B2
7519558 Ballard et al. Apr 2009 B2
7522060 Tumperi et al. Apr 2009 B1
7529698 Joao May 2009 B2
7533179 Tarquini et al. May 2009 B2
7533808 Song et al. May 2009 B2
7536346 Aliffi et al. May 2009 B2
7540021 Page May 2009 B2
7542993 Satterfield et al. Jun 2009 B2
7543739 Brown et al. Jun 2009 B2
7543740 Greene et al. Jun 2009 B2
7546271 Chmielewski et al. Jun 2009 B1
7548886 Kirkland et al. Jun 2009 B2
7552467 Lindsay Jun 2009 B2
7562093 Gelb et al. Jul 2009 B2
7562184 Henmi et al. Jul 2009 B2
7562814 Shao et al. Jul 2009 B1
7568616 Zuili Aug 2009 B2
7575157 Barnhardt et al. Aug 2009 B2
7580884 Cook Aug 2009 B2
7581112 Brown et al. Aug 2009 B2
7584146 Duhon Sep 2009 B1
7587366 Grim, III et al. Sep 2009 B2
7587368 Felsher Sep 2009 B2
7591425 Zuili et al. Sep 2009 B1
7593889 Raines et al. Sep 2009 B2
7593891 Kornegay et al. Sep 2009 B2
7594019 Clapper Sep 2009 B2
7603701 Gaucas Oct 2009 B2
7606401 Hoffman et al. Oct 2009 B2
7606725 Robertson et al. Oct 2009 B2
7606790 Levy Oct 2009 B2
7610216 May et al. Oct 2009 B1
7610229 Kornegay Oct 2009 B1
7610243 Haggerty et al. Oct 2009 B2
7620596 Knudson et al. Nov 2009 B2
7623844 Herrmann et al. Nov 2009 B2
7630924 Collins et al. Dec 2009 B1
7630932 Danaher et al. Dec 2009 B2
7636853 Cluts et al. Dec 2009 B2
7644868 Hare Jan 2010 B2
7647344 Skurtovich, Jr. et al. Jan 2010 B2
7647645 Edeki et al. Jan 2010 B2
7653593 Zarikian et al. Jan 2010 B2
7657431 Hayakawa Feb 2010 B2
7668769 Baker et al. Feb 2010 B2
7668840 Bayliss et al. Feb 2010 B2
7668921 Proux et al. Feb 2010 B2
7672865 Kumar et al. Mar 2010 B2
7672924 Scheurich et al. Mar 2010 B1
7672926 Ghazal et al. Mar 2010 B2
7673793 Greene et al. Mar 2010 B2
7676418 Chung et al. Mar 2010 B1
7676433 Ross et al. Mar 2010 B1
7685096 Margolus et al. Mar 2010 B2
7686214 Shao et al. Mar 2010 B1
7689007 Bous et al. Mar 2010 B2
7689505 Kasower Mar 2010 B2
7689506 Fei et al. Mar 2010 B2
7690032 Peirce Mar 2010 B1
7698445 Fitzpatrick et al. Apr 2010 B2
7701364 Zilberman Apr 2010 B1
7702550 Perg et al. Apr 2010 B2
7707122 Hull et al. Apr 2010 B2
7707163 Anzalone et al. Apr 2010 B2
7708190 Brandt et al. May 2010 B2
7708200 Helsper et al. May 2010 B2
7711635 Steele et al. May 2010 B2
7711636 Robida et al. May 2010 B2
7720750 Brody May 2010 B2
7725300 Pinto et al. May 2010 B2
7734523 Cui et al. Jun 2010 B1
7735125 Alvarez et al. Jun 2010 B1
7739139 Robertson et al. Jun 2010 B2
7739707 Sie et al. Jun 2010 B2
7742982 Chaudhuri et al. Jun 2010 B2
7747480 Agresta et al. Jun 2010 B1
7747520 Livermore et al. Jun 2010 B2
7747521 Serio Jun 2010 B2
7747559 Leitner et al. Jun 2010 B2
7752084 Pettitt Jul 2010 B2
7752236 Williams et al. Jul 2010 B2
7752554 Biggs et al. Jul 2010 B2
7756783 Crooks Jul 2010 B2
7761379 Zoldi et al. Jul 2010 B2
7761384 Madhogarhia Jul 2010 B2
7765311 Itabashi et al. Jul 2010 B2
7769696 Yoda Aug 2010 B2
7774270 MacCloskey Aug 2010 B1
7778885 Semprevivo et al. Aug 2010 B1
7779456 Dennis et al. Aug 2010 B2
7779457 Taylor Aug 2010 B2
7783281 Cook et al. Aug 2010 B1
7783515 Kumar et al. Aug 2010 B1
7787869 Rice et al. Aug 2010 B2
7788184 Kane Aug 2010 B2
7792715 Kasower Sep 2010 B1
7792864 Rice et al. Sep 2010 B1
7792903 Fischer et al. Sep 2010 B2
7793835 Coggeshall et al. Sep 2010 B1
7797725 Lunt et al. Sep 2010 B2
7801811 Merrell et al. Sep 2010 B1
7801828 Candella et al. Sep 2010 B2
7802104 Dickinson Sep 2010 B2
7805362 Merrell et al. Sep 2010 B1
7805391 Friedlander et al. Sep 2010 B2
7809797 Cooley et al. Oct 2010 B2
7813944 Luk et al. Oct 2010 B1
7827115 Weller et al. Nov 2010 B2
7832006 Chen et al. Nov 2010 B2
7835983 Lefner et al. Nov 2010 B2
7840459 Loftesness et al. Nov 2010 B1
7841004 Balducci et al. Nov 2010 B1
7841008 Cole et al. Nov 2010 B1
7844520 Franklin Nov 2010 B1
7848987 Haig Dec 2010 B2
7849029 Crooks et al. Dec 2010 B2
7853493 DeBie et al. Dec 2010 B2
7853518 Cagan Dec 2010 B2
7853526 Milana Dec 2010 B2
7853533 Eisen Dec 2010 B2
7853998 Blaisdell et al. Dec 2010 B2
7856397 Whipple et al. Dec 2010 B2
7856494 Kulkarni Dec 2010 B2
7860769 Benson Dec 2010 B2
7860783 Yang et al. Dec 2010 B2
7865427 Wright et al. Jan 2011 B2
7865439 Seifert et al. Jan 2011 B2
7865937 White et al. Jan 2011 B1
7870078 Clark et al. Jan 2011 B2
7870599 Pemmaraju Jan 2011 B2
7873382 Rydgren et al. Jan 2011 B2
7874488 Parkinson Jan 2011 B2
7877304 Coulter Jan 2011 B1
7877784 Chow et al. Jan 2011 B2
7882548 Heath et al. Feb 2011 B2
7890433 Singhal Feb 2011 B2
7904360 Evans Mar 2011 B2
7904367 Chung et al. Mar 2011 B2
7908242 Achanta Mar 2011 B1
7909246 Hogg et al. Mar 2011 B2
7912865 Akerman et al. Mar 2011 B2
7917715 Tallman, Jr. Mar 2011 B2
7925582 Kornegay et al. Apr 2011 B1
7929951 Stevens et al. Apr 2011 B2
7933835 Keane et al. Apr 2011 B2
7941363 Tanaka et al. May 2011 B2
7945515 Zoldi et al. May 2011 B2
7950577 Daniel May 2011 B1
7958046 Doerner et al. Jun 2011 B2
7961857 Zoldi et al. Jun 2011 B2
7962404 Metzger, II et al. Jun 2011 B1
7962467 Howard et al. Jun 2011 B2
7970679 Kasower Jun 2011 B2
7970698 Gupta et al. Jun 2011 B2
7970701 Lewis et al. Jun 2011 B2
7971246 Emigh et al. Jun 2011 B1
7975299 Balducci et al. Jul 2011 B1
7983932 Kane Jul 2011 B2
7983976 Nafeh et al. Jul 2011 B2
7983979 Holland, IV Jul 2011 B2
7984849 Berghel et al. Jul 2011 B2
7988043 Davis Aug 2011 B2
7991201 Bous et al. Aug 2011 B2
7991689 Brunzell et al. Aug 2011 B1
7991716 Crooks et al. Aug 2011 B2
7991751 Peled et al. Aug 2011 B2
7991901 Tarquini et al. Aug 2011 B2
7995994 Khetawat et al. Aug 2011 B2
7996521 Chamberlain et al. Aug 2011 B2
7996912 Spalink et al. Aug 2011 B2
8001034 Chung et al. Aug 2011 B2
8001042 Brunzell et al. Aug 2011 B1
8001153 Skurtovich, Jr. et al. Aug 2011 B2
8001597 Crooks Aug 2011 B2
8005749 Ginsberg Aug 2011 B2
8006291 Headley et al. Aug 2011 B2
8009873 Chapman Aug 2011 B2
8019678 Wright et al. Sep 2011 B2
8020763 Kowalchyk et al. Sep 2011 B1
8024263 Zarikian et al. Sep 2011 B2
8024264 Chaudhuri et al. Sep 2011 B2
8024271 Grant Sep 2011 B2
8027439 Zoldi et al. Sep 2011 B2
8027518 Baker et al. Sep 2011 B2
8027947 Hinsz et al. Sep 2011 B2
8028168 Smithies et al. Sep 2011 B2
8028326 Palmer et al. Sep 2011 B2
8028329 Whitcomb Sep 2011 B2
8028896 Carter et al. Oct 2011 B2
8032448 Anderson et al. Oct 2011 B2
8032449 Hu et al. Oct 2011 B2
8032927 Ross Oct 2011 B2
8037097 Guo et al. Oct 2011 B2
8037512 Wright et al. Oct 2011 B2
8041597 Li et al. Oct 2011 B2
8042159 Basner et al. Oct 2011 B2
8042193 Piliouras Oct 2011 B1
8049596 Sato Nov 2011 B2
8055667 Levy Nov 2011 B2
8056128 Dingle et al. Nov 2011 B1
8058972 Mohanty Nov 2011 B2
8060424 Kasower Nov 2011 B2
8060915 Voice et al. Nov 2011 B2
8060916 Bajaj et al. Nov 2011 B2
8065233 Lee et al. Nov 2011 B2
8065264 Achanta Nov 2011 B1
8065525 Zilberman Nov 2011 B2
8069053 Gervais et al. Nov 2011 B2
8069084 Mackouse Nov 2011 B2
8069256 Rasti Nov 2011 B2
8069485 Carter Nov 2011 B2
8073785 Candella et al. Dec 2011 B1
8078569 Kennel Dec 2011 B2
8090648 Zoldi et al. Jan 2012 B2
8095458 Peterson et al. Jan 2012 B2
8104679 Brown Jan 2012 B2
8116731 Buhrmann et al. Feb 2012 B2
8121962 Vaiciulis et al. Feb 2012 B2
8127986 Taylor et al. Mar 2012 B1
8131615 Diev et al. Mar 2012 B2
8151327 Eisen Apr 2012 B2
8195549 Kasower Jun 2012 B2
8201257 Andres et al. Jun 2012 B1
8204774 Chwast et al. Jun 2012 B2
8214262 Semprevivo et al. Jul 2012 B1
8214285 Hu et al. Jul 2012 B2
8224723 Bosch et al. Jul 2012 B2
8225395 Atwood et al. Jul 2012 B2
8234498 Britti et al. Jul 2012 B2
8239677 Colson Aug 2012 B2
8244629 Lewis et al. Aug 2012 B2
8255978 Dick Aug 2012 B2
8260914 Ranjan Sep 2012 B1
8280805 Abrahams et al. Oct 2012 B1
8280833 Miltonberger Oct 2012 B2
8285613 Coulter Oct 2012 B1
8285636 Curry et al. Oct 2012 B2
8296225 Maddipati et al. Oct 2012 B2
8296229 Yellin et al. Oct 2012 B1
8296250 Crooks et al. Oct 2012 B2
8312033 McMillan Nov 2012 B1
8321952 Spalink et al. Nov 2012 B2
8332338 Vaiciulis et al. Dec 2012 B2
8346593 Fanelli Jan 2013 B2
8355896 Kumar et al. Jan 2013 B2
8355967 Debie et al. Jan 2013 B2
8359278 Domenikos et al. Jan 2013 B2
8364588 Celka et al. Jan 2013 B2
8374973 Herbrich et al. Feb 2013 B2
8386377 Xiong et al. Feb 2013 B1
8429070 Hu et al. Apr 2013 B2
8463919 Tarquini et al. Jun 2013 B2
8468090 Lesandro et al. Jun 2013 B2
8478674 Kapczynski et al. Jul 2013 B1
8489479 Slater et al. Jul 2013 B2
8510329 Balkir et al. Aug 2013 B2
8515828 Wolf et al. Aug 2013 B1
8515844 Kasower Aug 2013 B2
8516439 Brass et al. Aug 2013 B2
8543499 Haggerty et al. Sep 2013 B2
8548137 Zoldi et al. Oct 2013 B2
8548903 Becker Oct 2013 B2
8549590 de Villiers Prichard et al. Oct 2013 B1
8559607 Zoldi et al. Oct 2013 B2
8567669 Griegel et al. Oct 2013 B2
8578496 Krishnappa Nov 2013 B1
8583593 Achanta Nov 2013 B1
8626671 Federgreen Jan 2014 B2
8630938 Cheng et al. Jan 2014 B2
8639920 Stack et al. Jan 2014 B2
8645301 Vaiciulis et al. Feb 2014 B2
8671115 Skurtovich, Jr. et al. Mar 2014 B2
8676684 Newman et al. Mar 2014 B2
8676726 Hore et al. Mar 2014 B2
8682755 Bucholz et al. Mar 2014 B2
8683586 Crooks Mar 2014 B2
8694427 Maddipati et al. Apr 2014 B2
8707445 Sher-Jan et al. Apr 2014 B2
8725613 Celka et al. May 2014 B1
8763133 Sher-Jan et al. Jun 2014 B2
8776225 Pierson et al. Jul 2014 B2
8781953 Kasower Jul 2014 B2
8781975 Bennett et al. Jul 2014 B2
8793777 Colson Jul 2014 B2
8805836 Hore et al. Aug 2014 B2
8812387 Samler et al. Aug 2014 B1
8819793 Gottschalk, Jr. Aug 2014 B2
8824648 Zoldi et al. Sep 2014 B2
8826393 Eisen Sep 2014 B2
8862514 Eisen Oct 2014 B2
8862526 Miltonberger Oct 2014 B2
8909664 Hopkins Dec 2014 B2
8918891 Coggeshall et al. Dec 2014 B2
8949981 Trollope Feb 2015 B1
9118646 Pierson et al. Aug 2015 B2
9191403 Zoldi et al. Nov 2015 B2
9194899 Zoldi et al. Nov 2015 B2
9196004 Eisen Nov 2015 B2
9210156 Little et al. Dec 2015 B1
9235728 Gottschalk, Jr. et al. Jan 2016 B2
9251541 Celka et al. Feb 2016 B2
9256624 Skurtovich, Jr. et al. Feb 2016 B2
9280658 Coggeshall et al. Mar 2016 B2
9361597 Britton et al. Jun 2016 B2
9367520 Zhao et al. Jun 2016 B2
9390384 Eisen Jul 2016 B2
9412141 Prichard et al. Aug 2016 B2
9483650 Sher-Jan et al. Nov 2016 B2
9489497 MaGill et al. Nov 2016 B2
9531738 Zoldi et al. Dec 2016 B2
9558368 Gottschalk, Jr. et al. Jan 2017 B2
9595066 Samler et al. Mar 2017 B2
9652802 Kasower May 2017 B1
9704195 Zoldi Jul 2017 B2
9710523 Skurtovich, Jr. et al. Jul 2017 B2
9710868 Gottschalk, Jr. et al. Jul 2017 B2
9754256 Britton et al. Sep 2017 B2
9754311 Eisen Sep 2017 B2
9760885 Ramalingam et al. Sep 2017 B1
9773227 Zoldi et al. Sep 2017 B2
9781147 Sher-Jan et al. Oct 2017 B2
9953321 Zoldi et al. Apr 2018 B2
10043213 Straub et al. Aug 2018 B2
10089679 Eisen Oct 2018 B2
10089686 Straub et al. Oct 2018 B2
10102530 Zoldi et al. Oct 2018 B2
10115153 Zoldi et al. Oct 2018 B2
10152736 Yang et al. Dec 2018 B2
10217163 Straub et al. Feb 2019 B2
10242540 Chen et al. Mar 2019 B2
10339527 Coleman et al. Jul 2019 B1
10373061 Kennel et al. Aug 2019 B2
10430604 Spinelli et al. Oct 2019 B2
10438308 Prichard et al. Oct 2019 B2
10497034 Yang et al. Dec 2019 B2
10510025 Zoldi et al. Dec 2019 B2
10528948 Zoldi et al. Jan 2020 B2
10579938 Zoldi et al. Mar 2020 B2
10592982 Samler et al. Mar 2020 B2
10593004 Gottschalk, Jr. et al. Mar 2020 B2
10692058 Zoldi et al. Jun 2020 B2
10699028 Kennedy et al. Jun 2020 B1
10713711 Zoldi Jul 2020 B2
10769290 Crawford et al. Sep 2020 B2
10791136 Zoldi et al. Sep 2020 B2
10896381 Zoldi et al. Jan 2021 B2
10896472 Stack et al. Jan 2021 B1
10902426 Zoldi et al. Jan 2021 B2
10909617 Kasower Feb 2021 B2
10977363 Leitner et al. Apr 2021 B2
10990979 Coleman et al. Apr 2021 B1
10999298 Eisen May 2021 B2
11023963 Zoldi et al. Jun 2021 B2
11030562 Dean et al. Jun 2021 B1
11037229 Zoldi et al. Jun 2021 B2
20010000536 Tarin Apr 2001 A1
20010014868 Herz et al. Aug 2001 A1
20010014878 Mitra et al. Aug 2001 A1
20010027413 Bhutta Oct 2001 A1
20010029470 Schultz et al. Oct 2001 A1
20010034631 Kiselik Oct 2001 A1
20010039523 Iwamoto Nov 2001 A1
20010039532 Coleman, Jr. et al. Nov 2001 A1
20010049620 Blasko Dec 2001 A1
20020004736 Roundtree et al. Jan 2002 A1
20020010664 Rabideau et al. Jan 2002 A1
20020010684 Moskowitz Jan 2002 A1
20020010701 Kosciuszko Jan 2002 A1
20020013899 Faul Jan 2002 A1
20020019804 Sutton Feb 2002 A1
20020019938 Aarons Feb 2002 A1
20020026519 Itabashi et al. Feb 2002 A1
20020032635 Harris et al. Mar 2002 A1
20020035684 Vogel et al. Mar 2002 A1
20020040344 Preiser et al. Apr 2002 A1
20020042879 Gould et al. Apr 2002 A1
20020049738 Epstein Apr 2002 A1
20020052841 Guthrie et al. May 2002 A1
20020052884 Farber et al. May 2002 A1
20020059521 Tasler May 2002 A1
20020062185 Runge et al. May 2002 A1
20020062281 Singhal May 2002 A1
20020069122 Yun et al. Jun 2002 A1
20020073044 Singhal Jun 2002 A1
20020077178 Oberberger et al. Jun 2002 A1
20020077964 Brody et al. Jun 2002 A1
20020080256 Bates et al. Jun 2002 A1
20020087460 Hornung Jul 2002 A1
20020091650 Ellis Jul 2002 A1
20020099649 Lee et al. Jul 2002 A1
20020099824 Bender et al. Jul 2002 A1
20020111910 Walsh Aug 2002 A1
20020119824 Allen Aug 2002 A1
20020128962 Kasower Sep 2002 A1
20020130176 Suzuki Sep 2002 A1
20020138417 Lawrence Sep 2002 A1
20020138751 Dutta Sep 2002 A1
20020147695 Khedkar et al. Oct 2002 A1
20020156676 Ahrens et al. Oct 2002 A1
20020161664 Shaya et al. Oct 2002 A1
20020161711 Sartor et al. Oct 2002 A1
20020169747 Chapman et al. Nov 2002 A1
20020173994 Ferguson, III Nov 2002 A1
20020178112 Goeller et al. Nov 2002 A1
20020184509 Scheidt et al. Dec 2002 A1
20020188544 Wizon et al. Dec 2002 A1
20020198824 Cook Dec 2002 A1
20030004879 Demoff et al. Jan 2003 A1
20030009418 Green et al. Jan 2003 A1
20030009426 Ruiz-Sanchez Jan 2003 A1
20030018549 Fei et al. Jan 2003 A1
20030033261 Knegendorf Feb 2003 A1
20030046554 Leydier et al. Mar 2003 A1
20030048904 Wang et al. Mar 2003 A1
20030050882 Degen et al. Mar 2003 A1
20030057278 Wong Mar 2003 A1
20030061163 Durfield Mar 2003 A1
20030065563 Elliott et al. Apr 2003 A1
20030070101 Buscemi Apr 2003 A1
20030078877 Beirne et al. Apr 2003 A1
20030093366 Halper et al. May 2003 A1
20030097320 Gordon May 2003 A1
20030097342 Whittingtom May 2003 A1
20030105696 Kalotay et al. Jun 2003 A1
20030115133 Bian Jun 2003 A1
20030143980 Choi et al. Jul 2003 A1
20030149744 Bierre et al. Aug 2003 A1
20030153299 Perfit et al. Aug 2003 A1
20030158751 Suresh et al. Aug 2003 A1
20030158960 Engberg Aug 2003 A1
20030163416 Kitajima Aug 2003 A1
20030182214 Taylor Sep 2003 A1
20030195859 Lawrence Oct 2003 A1
20030200447 Sjoblom Oct 2003 A1
20030208428 Raynes et al. Nov 2003 A1
20030212654 Harper et al. Nov 2003 A1
20030222500 Bayeur et al. Dec 2003 A1
20030225656 Aberman et al. Dec 2003 A1
20030225692 Bosch et al. Dec 2003 A1
20030225742 Tenner et al. Dec 2003 A1
20030229892 Sardera Dec 2003 A1
20030233278 Marshall Dec 2003 A1
20030236738 Lange et al. Dec 2003 A1
20040004117 Suzuki Jan 2004 A1
20040005912 Hubbe et al. Jan 2004 A1
20040006488 Fitall et al. Jan 2004 A1
20040010698 Rolfe Jan 2004 A1
20040024709 Yu et al. Feb 2004 A1
20040026496 Zuili Feb 2004 A1
20040030649 Nelson et al. Feb 2004 A1
20040039586 Garvey et al. Feb 2004 A1
20040044628 Mathew et al. Mar 2004 A1
20040054619 Watson et al. Mar 2004 A1
20040059653 Verkuylen et al. Mar 2004 A1
20040064401 Palaghita et al. Apr 2004 A1
20040078324 Lonnberg et al. Apr 2004 A1
20040098625 Lagadec et al. May 2004 A1
20040103147 Flesher et al. May 2004 A1
20040107363 Monteverde Jun 2004 A1
20040110119 Riconda et al. Jun 2004 A1
20040111305 Gavan et al. Jun 2004 A1
20040111335 Black et al. Jun 2004 A1
20040111358 Lange et al. Jun 2004 A1
20040117235 Shacham Jun 2004 A1
20040128227 Whipple et al. Jul 2004 A1
20040128232 Descloux Jul 2004 A1
20040133440 Carolan et al. Jul 2004 A1
20040139025 Coleman Jul 2004 A1
20040143526 Monasterio et al. Jul 2004 A1
20040149820 Zuili Aug 2004 A1
20040149827 Zuili Aug 2004 A1
20040153330 Miller et al. Aug 2004 A1
20040153448 Cheng et al. Aug 2004 A1
20040153521 Kogo Aug 2004 A1
20040153656 Gluts et al. Aug 2004 A1
20040158520 Noh Aug 2004 A1
20040158523 Dort Aug 2004 A1
20040158723 Root Aug 2004 A1
20040167793 Masuoka et al. Aug 2004 A1
20040177046 Ogram Sep 2004 A1
20040193538 Raines Sep 2004 A1
20040199456 Flint et al. Oct 2004 A1
20040199462 Starrs Oct 2004 A1
20040199789 Shaw et al. Oct 2004 A1
20040204948 Singletary et al. Oct 2004 A1
20040220896 Finlay et al. Nov 2004 A1
20040225594 Nolan, III et al. Nov 2004 A1
20040230448 Schaich Nov 2004 A1
20040230527 Hansen et al. Nov 2004 A1
20040230534 McGough Nov 2004 A1
20040230538 Clifton et al. Nov 2004 A1
20040234117 Tibor Nov 2004 A1
20040243514 Wankmueller Dec 2004 A1
20040243518 Clifton et al. Dec 2004 A1
20040243567 Levy Dec 2004 A1
20040250085 Tattan et al. Dec 2004 A1
20040255127 Arnouse Dec 2004 A1
20040260922 Goodman et al. Dec 2004 A1
20050001028 Zuili Jan 2005 A1
20050005168 Dick Jan 2005 A1
20050010513 Duckworth et al. Jan 2005 A1
20050010780 Kane et al. Jan 2005 A1
20050021476 Candella et al. Jan 2005 A1
20050021519 Ghouri Jan 2005 A1
20050027983 Klawon Feb 2005 A1
20050027995 Menschik et al. Feb 2005 A1
20050038726 Salomon et al. Feb 2005 A1
20050038737 Norris Feb 2005 A1
20050039086 Krishnamurthy et al. Feb 2005 A1
20050049991 Aggarwal Mar 2005 A1
20050050577 Westbrook et al. Mar 2005 A1
20050055231 Lee Mar 2005 A1
20050058262 Timmins et al. Mar 2005 A1
20050065874 Lefner et al. Mar 2005 A1
20050065950 Chaganti et al. Mar 2005 A1
20050071282 Lu et al. Mar 2005 A1
20050075985 Cartmell Apr 2005 A1
20050081052 Washington Apr 2005 A1
20050086161 Gallant Apr 2005 A1
20050091164 Varble Apr 2005 A1
20050097039 Kulcsar et al. May 2005 A1
20050097051 Madill, Jr. et al. May 2005 A1
20050097364 Edeki et al. May 2005 A1
20050102206 Savasoglu et al. May 2005 A1
20050105719 Huda May 2005 A1
20050125226 Magee Jun 2005 A1
20050125686 Brandt Jun 2005 A1
20050137899 Davies et al. Jun 2005 A1
20050138391 Mandalia et al. Jun 2005 A1
20050144143 Freiberg Jun 2005 A1
20050154664 Guy et al. Jul 2005 A1
20050154665 Kerr Jul 2005 A1
20050154671 Doan et al. Jul 2005 A1
20050165667 Cox Jul 2005 A1
20050187948 Monitzer et al. Aug 2005 A1
20050192008 Desai et al. Sep 2005 A1
20050197953 Broadbent et al. Sep 2005 A1
20050203885 Chenevich et al. Sep 2005 A1
20050216953 Ellingson Sep 2005 A1
20050229007 Bolle et al. Oct 2005 A1
20050240578 Biederman et al. Oct 2005 A1
20050242173 Suzuki Nov 2005 A1
20050246338 Bird Nov 2005 A1
20050251474 Shinn et al. Nov 2005 A1
20050256809 Sadri Nov 2005 A1
20050262014 Fickes Nov 2005 A1
20050262158 Sauermann Nov 2005 A1
20050273333 Morin et al. Dec 2005 A1
20050273442 Bennett et al. Dec 2005 A1
20050278542 Pierson et al. Dec 2005 A1
20050279827 Mascavage et al. Dec 2005 A1
20050279869 Barklage Dec 2005 A1
20060004663 Singhal Jan 2006 A1
20060014129 Coleman et al. Jan 2006 A1
20060020611 Gilbert et al. Jan 2006 A1
20060020814 Lieblich Jan 2006 A1
20060032909 Seegar Feb 2006 A1
20060041464 Powers et al. Feb 2006 A1
20060045105 Dobosz et al. Mar 2006 A1
20060047605 Ahmad Mar 2006 A1
20060059073 Walzak Mar 2006 A1
20060059110 Madhok et al. Mar 2006 A1
20060064374 Helsper et al. Mar 2006 A1
20060074798 Din et al. Apr 2006 A1
20060074986 Mallalieu et al. Apr 2006 A1
20060074991 Lussier et al. Apr 2006 A1
20060080230 Freiberg Apr 2006 A1
20060080263 Willis et al. Apr 2006 A1
20060085454 Blegen et al. Apr 2006 A1
20060089905 Song et al. Apr 2006 A1
20060101508 Taylor May 2006 A1
20060106605 Saunders et al. May 2006 A1
20060112279 Cohen et al. May 2006 A1
20060112280 Cohen et al. May 2006 A1
20060129428 Wennberg Jun 2006 A1
20060129481 Bhatt et al. Jun 2006 A1
20060129840 Milgramm et al. Jun 2006 A1
20060131390 Kim Jun 2006 A1
20060136332 Ziegler Jun 2006 A1
20060140460 Coutts Jun 2006 A1
20060143073 Engel et al. Jun 2006 A1
20060144924 Stover Jul 2006 A1
20060149580 Helsper et al. Jul 2006 A1
20060149674 Cook et al. Jul 2006 A1
20060155573 Hartunian Jul 2006 A1
20060161435 Atef et al. Jul 2006 A1
20060161592 Ertoz et al. Jul 2006 A1
20060173776 Shalley et al. Aug 2006 A1
20060173792 Glass Aug 2006 A1
20060177226 Ellis, III Aug 2006 A1
20060178971 Owen et al. Aug 2006 A1
20060179004 Fuchs Aug 2006 A1
20060184440 Britti et al. Aug 2006 A1
20060184585 Grear et al. Aug 2006 A1
20060195351 Bayburtian Aug 2006 A1
20060200855 Willis Sep 2006 A1
20060202012 Grano et al. Sep 2006 A1
20060204051 Holland, IV Sep 2006 A1
20060206725 Milgramm et al. Sep 2006 A1
20060212386 Willey et al. Sep 2006 A1
20060218069 Aberman et al. Sep 2006 A1
20060229961 Lyftogt et al. Oct 2006 A1
20060239512 Petrillo Oct 2006 A1
20060239513 Song et al. Oct 2006 A1
20060242046 Haggerty et al. Oct 2006 A1
20060242047 Haggerty et al. Oct 2006 A1
20060253358 Delgrosso et al. Nov 2006 A1
20060253583 Dixon et al. Nov 2006 A1
20060255914 Westman Nov 2006 A1
20060262929 Vatanen et al. Nov 2006 A1
20060265243 Racho et al. Nov 2006 A1
20060271456 Romain et al. Nov 2006 A1
20060271457 Romain et al. Nov 2006 A1
20060271633 Adler Nov 2006 A1
20060273158 Suzuki Dec 2006 A1
20060277043 Tomes et al. Dec 2006 A1
20060277092 Williams Dec 2006 A1
20060282285 Helsper et al. Dec 2006 A1
20060282372 Endres et al. Dec 2006 A1
20060282395 Leibowitz Dec 2006 A1
20060287765 Kraft Dec 2006 A1
20060288090 Kraft Dec 2006 A1
20060294023 Lu Dec 2006 A1
20070005508 Chiang Jan 2007 A1
20070011100 Libin et al. Jan 2007 A1
20070016500 Chatterji et al. Jan 2007 A1
20070016521 Wang Jan 2007 A1
20070016522 Wang Jan 2007 A1
20070022141 Singleton et al. Jan 2007 A1
20070022297 Britti et al. Jan 2007 A1
20070038483 Wood Feb 2007 A1
20070038497 Britti et al. Feb 2007 A1
20070038568 Greene et al. Feb 2007 A1
20070040017 Kozlay Feb 2007 A1
20070040019 Berghel et al. Feb 2007 A1
20070043577 Kasower Feb 2007 A1
20070047770 Swope et al. Mar 2007 A1
20070048765 Abramson Mar 2007 A1
20070050638 Rasti Mar 2007 A1
20070059442 Sabeta Mar 2007 A1
20070061273 Greene et al. Mar 2007 A1
20070067207 Haggerty et al. Mar 2007 A1
20070067297 Kublickis Mar 2007 A1
20070067437 Sindambiwe Mar 2007 A1
20070072190 Aggarwal Mar 2007 A1
20070073622 Kane Mar 2007 A1
20070073630 Greene et al. Mar 2007 A1
20070078786 Bous et al. Apr 2007 A1
20070078908 Rohatgi et al. Apr 2007 A1
20070078985 Shao et al. Apr 2007 A1
20070083460 Bachenheimer Apr 2007 A1
20070087795 Aletto et al. Apr 2007 A1
20070093234 Willis et al. Apr 2007 A1
20070094137 Phillips et al. Apr 2007 A1
20070094264 Nair Apr 2007 A1
20070100774 Abdon May 2007 A1
20070106582 Baker et al. May 2007 A1
20070106611 Larsen May 2007 A1
20070107050 Selvarajan May 2007 A1
20070109103 Jedrey et al. May 2007 A1
20070110282 Millsapp May 2007 A1
20070112667 Rucker May 2007 A1
20070112668 Celano et al. May 2007 A1
20070118393 Rosen et al. May 2007 A1
20070130070 Williams Jun 2007 A1
20070155411 Morrison Jul 2007 A1
20070157299 Hare Jul 2007 A1
20070160458 Yen Jul 2007 A1
20070168246 Haggerty et al. Jul 2007 A1
20070168480 Biggs et al. Jul 2007 A1
20070174208 Black et al. Jul 2007 A1
20070179903 Seinfeld et al. Aug 2007 A1
20070180209 Tallman Aug 2007 A1
20070180263 Delgrosso et al. Aug 2007 A1
20070186276 McRae et al. Aug 2007 A1
20070192248 West Aug 2007 A1
20070192853 Shraim et al. Aug 2007 A1
20070198410 Labgold et al. Aug 2007 A1
20070205266 Carr et al. Sep 2007 A1
20070208669 Rivette et al. Sep 2007 A1
20070214037 Shubert et al. Sep 2007 A1
20070214365 Cornett et al. Sep 2007 A1
20070219928 Madhogarhia Sep 2007 A1
20070220594 Tulsyan Sep 2007 A1
20070220611 Socolow et al. Sep 2007 A1
20070226093 Chan et al. Sep 2007 A1
20070226129 Liao et al. Sep 2007 A1
20070233614 McNelley et al. Oct 2007 A1
20070234427 Gardner et al. Oct 2007 A1
20070244782 Chimento Oct 2007 A1
20070244807 Andringa et al. Oct 2007 A1
20070250459 Schwarz et al. Oct 2007 A1
20070250704 Hallam-Baker Oct 2007 A1
20070250920 Lindsay Oct 2007 A1
20070261114 Pomerantsev Nov 2007 A1
20070266439 Kraft Nov 2007 A1
20070282730 Carpenter et al. Dec 2007 A1
20070288355 Roland et al. Dec 2007 A1
20070288360 Seeklus Dec 2007 A1
20070288559 Parsadayan Dec 2007 A1
20070291995 Rivera Dec 2007 A1
20070292006 Johnson Dec 2007 A1
20070294104 Boaz et al. Dec 2007 A1
20070299759 Kelly Dec 2007 A1
20080010203 Grant Jan 2008 A1
20080010206 Coleman Jan 2008 A1
20080010683 Baddour et al. Jan 2008 A1
20080010687 Gonen et al. Jan 2008 A1
20080015887 Drabek et al. Jan 2008 A1
20080021804 Deckoff Jan 2008 A1
20080027857 Benson Jan 2008 A1
20080027858 Benson Jan 2008 A1
20080033742 Bernasconi Feb 2008 A1
20080052182 Marshall Feb 2008 A1
20080052244 Tsuei et al. Feb 2008 A1
20080059224 Schechter Mar 2008 A1
20080059236 Cartier Mar 2008 A1
20080059352 Chandran Mar 2008 A1
20080059364 Tidwell et al. Mar 2008 A1
20080059366 Fou Mar 2008 A1
20080059449 Webster et al. Mar 2008 A1
20080063172 Ahuja et al. Mar 2008 A1
20080066188 Kwak Mar 2008 A1
20080071882 Hering et al. Mar 2008 A1
20080076386 Khetawat et al. Mar 2008 A1
20080077526 Arumugam Mar 2008 A1
20080098222 Zilberman Apr 2008 A1
20080103798 Domenikos et al. May 2008 A1
20080103799 Domenikos et al. May 2008 A1
20080103800 Domenikos May 2008 A1
20080103811 Sosa May 2008 A1
20080103972 Lanc May 2008 A1
20080104021 Cai et al. May 2008 A1
20080104672 Lunde et al. May 2008 A1
20080109875 Kraft May 2008 A1
20080114837 Biggs et al. May 2008 A1
20080115191 Kim et al. May 2008 A1
20080120237 Lin May 2008 A1
20080126116 Singhai May 2008 A1
20080126233 Hogan May 2008 A1
20080140576 Lewis et al. Jun 2008 A1
20080147454 Walker et al. Jun 2008 A1
20080154758 Schattmaier et al. Jun 2008 A1
20080162202 Khanna et al. Jul 2008 A1
20080162383 Kraft Jul 2008 A1
20080167883 Thavildar Khazaneh Jul 2008 A1
20080175360 Schwarz et al. Jul 2008 A1
20080177655 Zalik Jul 2008 A1
20080177841 Sinn et al. Jul 2008 A1
20080189789 Lamontagne Aug 2008 A1
20080195548 Chu et al. Aug 2008 A1
20080205655 Wilkins et al. Aug 2008 A1
20080208548 Metzger et al. Aug 2008 A1
20080208610 Thomas et al. Aug 2008 A1
20080208726 Tsantes et al. Aug 2008 A1
20080208873 Boehmer Aug 2008 A1
20080217400 Portano Sep 2008 A1
20080228635 Megdal et al. Sep 2008 A1
20080228775 Abhyanker et al. Sep 2008 A1
20080243680 Megdal et al. Oct 2008 A1
20080244717 Jelatis et al. Oct 2008 A1
20080255922 Feldman et al. Oct 2008 A1
20080255992 Lin Oct 2008 A1
20080256613 Grover Oct 2008 A1
20080263058 Peden Oct 2008 A1
20080270209 Mauseth et al. Oct 2008 A1
20080281737 Fajardo Nov 2008 A1
20080281743 Pettit Nov 2008 A1
20080282324 Hoal Nov 2008 A1
20080288382 Smith et al. Nov 2008 A1
20080288430 Friedlander et al. Nov 2008 A1
20080288790 Wilson Nov 2008 A1
20080294540 Celka et al. Nov 2008 A1
20080294689 Metzger et al. Nov 2008 A1
20080296367 Parkinson Dec 2008 A1
20080296382 Connell, II et al. Dec 2008 A1
20080300877 Gilbert et al. Dec 2008 A1
20080306750 Wunder et al. Dec 2008 A1
20080319889 Hammad Dec 2008 A1
20080320575 Gelb et al. Dec 2008 A1
20090007220 Ormazabal et al. Jan 2009 A1
20090018934 Peng et al. Jan 2009 A1
20090021349 Errico et al. Jan 2009 A1
20090024417 Marks et al. Jan 2009 A1
20090024505 Patel et al. Jan 2009 A1
20090024636 Shiloh Jan 2009 A1
20090024663 McGovern Jan 2009 A1
20090026270 Connell, II et al. Jan 2009 A1
20090031426 Dal Lago et al. Jan 2009 A1
20090043637 Eder Feb 2009 A1
20090043691 Kasower Feb 2009 A1
20090044279 Crawford et al. Feb 2009 A1
20090048877 Binns et al. Feb 2009 A1
20090048957 Celano Feb 2009 A1
20090055894 Lorsch Feb 2009 A1
20090079539 Johnson Mar 2009 A1
20090094311 Awadallah et al. Apr 2009 A1
20090094674 Schwartz et al. Apr 2009 A1
20090099960 Robida et al. Apr 2009 A1
20090106150 Pelegero et al. Apr 2009 A1
20090106153 Ezra Apr 2009 A1
20090106846 Dupray et al. Apr 2009 A1
20090112650 Iwane Apr 2009 A1
20090119106 Rajakumar et al. May 2009 A1
20090119299 Rhodes May 2009 A1
20090125369 Kloostra et al. May 2009 A1
20090125439 Zarikian et al. May 2009 A1
20090125463 Hido May 2009 A1
20090126013 Atwood et al. May 2009 A1
20090138335 Lieberman May 2009 A1
20090138391 Dudley et al. May 2009 A1
20090141318 Hughes Jun 2009 A1
20090150166 Leite et al. Jun 2009 A1
20090150238 Marsh et al. Jun 2009 A1
20090151005 Bell et al. Jun 2009 A1
20090158404 Hahn et al. Jun 2009 A1
20090164380 Brown Jun 2009 A1
20090172815 Gu et al. Jul 2009 A1
20090177670 Grenier et al. Jul 2009 A1
20090182653 Zimiles Jul 2009 A1
20090183259 Rinek et al. Jul 2009 A1
20090199264 Lang Aug 2009 A1
20090205032 Hinton et al. Aug 2009 A1
20090206993 Di Mambro et al. Aug 2009 A1
20090216560 Siegel Aug 2009 A1
20090216747 Li et al. Aug 2009 A1
20090217342 Nadler Aug 2009 A1
20090222308 Zoldi et al. Sep 2009 A1
20090222362 Stood et al. Sep 2009 A1
20090222373 Choudhuri et al. Sep 2009 A1
20090222374 Choudhuri et al. Sep 2009 A1
20090222375 Choudhuri et al. Sep 2009 A1
20090222376 Choudhuri et al. Sep 2009 A1
20090222377 Choudhuri et al. Sep 2009 A1
20090222378 Choudhuri et al. Sep 2009 A1
20090222379 Choudhuri et al. Sep 2009 A1
20090222380 Choudhuri et al. Sep 2009 A1
20090222897 Carow et al. Sep 2009 A1
20090224875 Rabinowitz et al. Sep 2009 A1
20090224889 Aggarwal et al. Sep 2009 A1
20090226056 Vlachos et al. Sep 2009 A1
20090234665 Conkel Sep 2009 A1
20090234738 Britton et al. Sep 2009 A1
20090240609 Cho et al. Sep 2009 A1
20090241168 Readshaw Sep 2009 A1
20090241173 Troyansky Sep 2009 A1
20090248198 Siegel et al. Oct 2009 A1
20090248497 Hueter Oct 2009 A1
20090248567 Haggerty et al. Oct 2009 A1
20090248568 Haggerty et al. Oct 2009 A1
20090248569 Haggerty et al. Oct 2009 A1
20090248570 Haggerty et al. Oct 2009 A1
20090248571 Haggerty et al. Oct 2009 A1
20090248572 Haggerty et al. Oct 2009 A1
20090248573 Haggerty et al. Oct 2009 A1
20090249451 Su et al. Oct 2009 A1
20090254476 Sharma et al. Oct 2009 A1
20090254484 Forero et al. Oct 2009 A1
20090254656 Vignisson et al. Oct 2009 A1
20090254971 Herz et al. Oct 2009 A1
20090257595 De Cesare et al. Oct 2009 A1
20090259470 Chang Oct 2009 A1
20090259560 Bachenheimer Oct 2009 A1
20090259588 Lindsay Oct 2009 A1
20090259855 de Cesare et al. Oct 2009 A1
20090261189 Ellis, Jr. Oct 2009 A1
20090270126 Liu Oct 2009 A1
20090271265 Lay et al. Oct 2009 A1
20090271617 Song et al. Oct 2009 A1
20090272801 Connell, II et al. Nov 2009 A1
20090276244 Baldwin, Jr. et al. Nov 2009 A1
20090281945 Shakkarwar Nov 2009 A1
20090281951 Shakkarwar Nov 2009 A1
20090289110 Regen et al. Nov 2009 A1
20090300066 Guo et al. Dec 2009 A1
20090307778 Mardikar Dec 2009 A1
20090326972 Washington Dec 2009 A1
20090327054 Yao et al. Dec 2009 A1
20090328173 Jakobson et al. Dec 2009 A1
20100024037 Grzymala-Busse et al. Jan 2010 A1
20100030677 Melik-Aslanian et al. Feb 2010 A1
20100031030 Kao et al. Feb 2010 A1
20100037147 Champion et al. Feb 2010 A1
20100037308 Lin et al. Feb 2010 A1
20100042526 Martinov Feb 2010 A1
20100043055 Baumgart Feb 2010 A1
20100049803 Ogilvie et al. Feb 2010 A1
20100070620 Awadallah et al. Mar 2010 A1
20100077006 El Emam et al. Mar 2010 A1
20100085146 Johnson Apr 2010 A1
20100088233 Tattan et al. Apr 2010 A1
20100088338 Pavoni, Jr. et al. Apr 2010 A1
20100094664 Bush et al. Apr 2010 A1
20100094758 Chamberlain et al. Apr 2010 A1
20100094767 Miltonberger Apr 2010 A1
20100094768 Miltonberger Apr 2010 A1
20100094910 Bayliss Apr 2010 A1
20100095357 Willis et al. Apr 2010 A1
20100100406 Lim Apr 2010 A1
20100100945 Ozzie et al. Apr 2010 A1
20100107225 Spencer et al. Apr 2010 A1
20100114724 Ghosh et al. May 2010 A1
20100114744 Gonen May 2010 A1
20100121767 Coulter et al. May 2010 A1
20100130172 Vendrow et al. May 2010 A1
20100131273 Aley-Raz et al. May 2010 A1
20100132043 Bjorn et al. May 2010 A1
20100145836 Baker et al. Jun 2010 A1
20100145840 Kasower Jun 2010 A1
20100158207 Dhawan et al. Jun 2010 A1
20100169210 Bous et al. Jul 2010 A1
20100169947 Sarmah et al. Jul 2010 A1
20100174813 Hildreth et al. Jul 2010 A1
20100185546 Pollard Jul 2010 A1
20100188684 Kumara Jul 2010 A1
20100205662 Ibrahim et al. Aug 2010 A1
20100217837 Ansari et al. Aug 2010 A1
20100218255 Ritman et al. Aug 2010 A1
20100228649 Pettitt Sep 2010 A1
20100228657 Kagarlis Sep 2010 A1
20100229225 Sarmah et al. Sep 2010 A1
20100229230 Edeki et al. Sep 2010 A1
20100229245 Singhal Sep 2010 A1
20100241501 Marshall Sep 2010 A1
20100250364 Song et al. Sep 2010 A1
20100250411 Rodski Sep 2010 A1
20100250509 Andersen Sep 2010 A1
20100250955 Trevithick et al. Sep 2010 A1
20100257577 Grandison et al. Oct 2010 A1
20100268557 Faith et al. Oct 2010 A1
20100268660 Ekdahl Oct 2010 A1
20100274679 Hammad Oct 2010 A1
20100274734 Chung et al. Oct 2010 A1
20100275265 Fiske et al. Oct 2010 A1
20100280882 Faith et al. Nov 2010 A1
20100293090 Domenikos Nov 2010 A1
20100293114 Khan et al. Nov 2010 A1
20100302157 Zilberman Dec 2010 A1
20100306101 Lefner et al. Dec 2010 A1
20100313273 Freas Dec 2010 A1
20100325035 Hilgers et al. Dec 2010 A1
20100325442 Petrone et al. Dec 2010 A1
20100332292 Anderson Dec 2010 A1
20100332362 Ramsey et al. Dec 2010 A1
20110004498 Readshaw Jan 2011 A1
20110016042 Cho et al. Jan 2011 A1
20110040629 Chiu et al. Feb 2011 A1
20110040983 Grzymala-Busse et al. Feb 2011 A1
20110047071 Choudhuri et al. Feb 2011 A1
20110060905 Stack et al. Mar 2011 A1
20110066547 Clark et al. Mar 2011 A1
20110082768 Eisen Apr 2011 A1
20110093383 Haggerty et al. Apr 2011 A1
20110112958 Haggerty et al. May 2011 A1
20110119291 Rice May 2011 A1
20110126024 Beatson et al. May 2011 A1
20110126275 Anderson et al. May 2011 A1
20110131123 Griffin Jun 2011 A1
20110145899 Cao et al. Jun 2011 A1
20110164746 Nice et al. Jul 2011 A1
20110166988 Coulter Jul 2011 A1
20110178899 Huszar Jul 2011 A1
20110184838 Winters et al. Jul 2011 A1
20110184851 Megdal et al. Jul 2011 A1
20110196791 Dominguez Aug 2011 A1
20110219421 Ullman et al. Sep 2011 A1
20110238566 Santos Sep 2011 A1
20110260832 Ross et al. Oct 2011 A1
20110276496 Neville et al. Nov 2011 A1
20110282778 Wright et al. Nov 2011 A1
20110289032 Crooks et al. Nov 2011 A1
20110289322 Rasti Nov 2011 A1
20110295721 MacDonald Dec 2011 A1
20110295750 Rammal Dec 2011 A1
20110296529 Bhanoo et al. Dec 2011 A1
20110302412 Deng et al. Dec 2011 A1
20110302641 Hald et al. Dec 2011 A1
20120017266 DiChiara et al. Jan 2012 A1
20120030080 Slater et al. Feb 2012 A1
20120030771 Pierson et al. Feb 2012 A1
20120036352 Tovar et al. Feb 2012 A1
20120054592 Jaffe et al. Mar 2012 A1
20120066073 Dilip et al. Mar 2012 A1
20120066084 Sneyders Mar 2012 A1
20120101939 Kasower Apr 2012 A1
20120158574 Brunzell et al. Jun 2012 A1
20120158654 Behren et al. Jun 2012 A1
20120198556 Patel Aug 2012 A1
20120215682 Lent et al. Aug 2012 A1
20120278227 Kolo et al. Nov 2012 A1
20120278249 Duggal et al. Nov 2012 A1
20120290660 Rao et al. Nov 2012 A1
20130004033 Trugenberger et al. Jan 2013 A1
20130018811 Britti et al. Jan 2013 A1
20130031624 Britti et al. Jan 2013 A1
20130132060 Badhe May 2013 A1
20130132151 Stibel et al. May 2013 A1
20130173450 Celka et al. Jul 2013 A1
20130185293 Boback Jul 2013 A1
20130211986 Debie et al. Aug 2013 A1
20130218797 Prichard et al. Aug 2013 A1
20130332342 Kasower Dec 2013 A1
20140007238 Magee et al. Jan 2014 A1
20140058910 Abeles Feb 2014 A1
20140149304 Bucholz et al. May 2014 A1
20140214636 Rajsky Jul 2014 A1
20140283097 Allen et al. Sep 2014 A1
20140304822 Sher-Jan et al. Oct 2014 A1
20150142595 Acuña-Rohter May 2015 A1
20150161529 Kondaji et al. Jun 2015 A1
20150186901 Miltonberger Jul 2015 A1
20150199784 Straub et al. Jul 2015 A1
20150295924 Gottschalk, Jr. Oct 2015 A1
20160012561 Lappenbusch et al. Jan 2016 A1
20160063278 Kraska et al. Mar 2016 A1
20160063645 Houseworth et al. Mar 2016 A1
20160071208 Straub et al. Mar 2016 A1
20160086262 Straub et al. Mar 2016 A1
20160210450 Su Jul 2016 A1
20160328814 Prichard et al. Nov 2016 A1
20160344758 Cohen et al. Nov 2016 A1
20160379011 Koike et al. Dec 2016 A1
20170099314 Klatt et al. Apr 2017 A1
20170177683 Koike et al. Jun 2017 A1
20170206376 Sher-Jan Jul 2017 A1
20170270629 Fitzgerald Sep 2017 A1
20170278182 Kasower Sep 2017 A1
20170287065 Samler et al. Oct 2017 A1
20170357971 Pitz et al. Dec 2017 A1
20170374076 Pierson et al. Dec 2017 A1
20180004978 Hebert et al. Jan 2018 A1
20180130157 Gottschalk, Jr. et al. May 2018 A1
20180322572 Straub et al. Nov 2018 A1
20190073676 Wang Mar 2019 A1
20190164173 Liu et al. May 2019 A1
20190228178 Sharma et al. Jul 2019 A1
20190311366 Zoldi et al. Oct 2019 A1
20190377896 Spinelli et al. Dec 2019 A1
20200134629 Zoldi et al. Apr 2020 A1
20200143465 Chilaka et al. May 2020 A1
20200145436 Brown et al. May 2020 A1
20200151628 Zoldi et al. May 2020 A1
20200242615 Chandra et al. Jul 2020 A1
20200293684 Harris et al. Sep 2020 A1
20200380112 Allen Dec 2020 A1
20200396246 Zoldi et al. Dec 2020 A1
20210021631 Okutan et al. Jan 2021 A1
20210150532 Zhang et al. May 2021 A1
Foreign Referenced Citations (44)
Number Date Country
3 058 653 Apr 2020 CA
104877993 Sep 2015 CN
91 08 341 Oct 1991 DE
0 554 083 Aug 1993 EP
2 939 361 Oct 2019 EP
2 384 087 Jul 2003 GB
2 392 748 Mar 2004 GB
2 518 099 Mar 2015 GB
2011-134252 Jul 2011 JP
5191376 May 2013 JP
10-2004-0034063 Apr 2004 KR
I256569 Jun 2006 TW
WO 94006103 Mar 1994 WO
WO 96041488 Dec 1996 WO
WO 00055778 Sep 2000 WO
WO 00055789 Sep 2000 WO
WO 00055790 Sep 2000 WO
WO 01011522 Feb 2001 WO
WO 01084281 Nov 2001 WO
WO 02027610 Apr 2002 WO
WO 02097563 Dec 2002 WO
WO 03071388 Aug 2003 WO
WO 02037219 May 2004 WO
WO 2004046882 Jun 2004 WO
WO 2006069199 Jun 2006 WO
WO 2007001394 Jan 2007 WO
WO 2008054403 May 2008 WO
WO 2008054849 May 2008 WO
WO 2008147918 Dec 2008 WO
WO 2009062111 May 2009 WO
WO 2009117518 Sep 2009 WO
WO 2010132492 Nov 2010 WO
WO 2011044036 Apr 2011 WO
WO 2012054646 Apr 2012 WO
WO 2012112781 Aug 2012 WO
WO 2013026343 Feb 2013 WO
WO 2013126281 Aug 2013 WO
WO 2014008079 Jan 2014 WO
WO 2014008247 Jan 2014 WO
WO 2014150987 Sep 2014 WO
WO 2018175440 Sep 2018 WO
WO 2018208770 Nov 2018 WO
WO 2019006272 Jan 2019 WO
WO 2019050864 Mar 2019 WO
Non-Patent Literature Citations (127)
Entry
The Scourge of Internet Personal Data Collection; 2013 International Conference on Availability, Reliability and Security (pp. 821-828); Esma Aimeur, Manuel Lafond; Sep. 2, 2013. (Year: 2013).
Exploring User Behavior and Cybersecurity Knowledge—An experimental study in Online Shopping; 2018 16th Annual Conference on Privacy, Security and Trust (PST) (pp. 1-10); Ghada El Haddad, Amin Shahab, Esma Aimeur; Aug. 28, 2018. (Year: 2018).
U.S. Appl. No. 09/557,252, filed Apr. 24, 2000, Page.
U.S. Appl. No. 12/705,489, filed Feb. 12, 2010, Bargoli et al.
U.S. Appl. No. 12/705,511, filed Feb. 12, 2010, Bargoli et al.
“A New Approach to Fraud Solutions”, BasePoint Science Solving Fraud, pp. 8, 2006.
Aad et al., “NRC Data Collection and the Privacy by Design Principles”, IEEE, Nov. 2010, pp. 5.
“Arizona Company Has Found Key in Stopping ID Theft,” PR Newswire, New York, Aug. 10, 2005 http://proquest.umi.com/pqdweb?did-880104711&sid=1&Fmt=3&clientId=19649&RQT=309&Vname=PQD.
ABC News Now:Money Matters, as broadcasted Nov. 15, 2005 with guest Todd Davis (CEO of Lifelock), pp. 6.
AlSalamah et al., “Security Risk Management in Online System”, 2017 5th International Conference on Applied Computing and Information Technology/4th International Conference on Computational Science/Intelligence and Applied lnformatics/2nd International Conference on Big Data, Cloud Computing, Data Science & Engineering, 2017, pp. 119-124.
Anonymous, “Feedback”, Credit Management, ABI/INFORM Global, Sep. 2006, pp. 6.
“Beverly Hills Man Convicted of Operating ‘Bust-Out’ Schemes that Caused More than $8 Million in Losses”, Department of Justice, Jul. 25, 2006, 2 Pgs.
Bielski, Lauren, “Will you Spend to Thwart ID Theft?” ABA Banking Journal, Apr. 2005, pp. 54, 56-57, 60.
BlueCava, “What We Do”, http://www.bluecava.com/what-we-do/, printed Nov. 5, 2012 in 3 pages.
“Bust-Out Schemes”, Visual Analytics Inc. Technical Product Support, Newsletter vol. 4, Issue 1, Jan. 2005, pp. 7.
Chores & Allowances, “Do Kids Have Credit Reports?” Oct. 15, 2007, http://choresandallowances.blogspot.com/2007/10/do-kids-have-credit-reports.html, pp. 5.
CreditSesame; “FAQ's”; http://www.creditsesame.com/how-we-help/faqs/#cb printed Dec. 5, 2011 in 8 pages.
CreditSesame; “Promote Your Financial Responsibility to Get an Edge in Life”; http://www.creditsesame.com/credit-badge/ printed Dec. 2, 2011 in 1 page.
Cowie, Norman, “Warning Bells & ‘The Bust-Out’”, Business Credit, Jul. 1, 2000, pp. 5.
Cullen, Terri; “The Wall Street Journal Complete Identity Theft Guidebook:How to Protect Yourself from the Most Pervasive Crime in America”; Chapter 3, pp. 59-79; Jul. 10, 2007.
“Data Loss Prevention (DLP) Software”, http://www.symantec.com/data-loss-prevention/ printed Apr. 8, 2013 in 8 pages.
“Data Protection”, http://compliantprocessing.com/data-protection/ printed Apr. 8, 2013 in 4 pages.
Day, Jo and Kevin; “ID-ology: A Planner's Guide to Identity Theft”; Journal of Financial Planning:Tech Talk; pp. 36-38; Sep. 2004.
EFunds Corporation, “Data & Decisioning: Debit Report” printed Apr. 1, 2007, http://www.efunds.com/web/industry-solutions/financial-services/frm-debit-report/htm in 1 page.
Elmasri et al., “Fundamentals of Database Systems, Third Edition (Excerpts)”, Jun. 2000, pp. 253, 261, 268-270, 278-280, 585, 595.
Equifax; “Equifax Credit Watch”; https://www.econsumer.equifax.co.uk/consumer/uk/sitepage.ehtml, dated Jun. 27, 2007 on www.archive.org.
Ettorre, “Paul Kahn on Exceptional Marketing,” Management Review, vol. 83, No. 11, Nov. 1994, pp. 48-51.
Experian Team, “Impact on Credit Scores of Inquiries for an Auto Loan,” Ask Experian, Mar. 1, 2009, pp. 5.
“Fair Isaac Introduces Falcon One System to Combat Fraud at Every Customer Interaction”, Business Wire, May 5, 2005, pp. 3.
“Fair Isaac Offers New Fraud Tool”, National Mortgage News & Source Media, Inc., Jun. 13, 2005, pp. 2.
Familysecure.com, “Frequently Asked Questions”, http://www.familysecure.com/FAQ.aspx as archived Jul. 15, 2007 in 3 pages.
FamilySecure.com; “Identity Theft Protection for the Whole Family | FamilySecure.com” http://www.familysecure.com/, as retrieved on Nov. 5, 2009.
“Fighting the New Face of Fraud”, FinanceTech, http://www.financetech.com/showArticle.jhtml?articleID=167100405, Aug. 2, 2005.
“FinExtra, Basepoint Analytics Introduces Predictive Technology for Mortgage Fraud”, Oct. 5, 2005, pp. 3.
Fisher, Joseph, “Access to Fair Credit Reports: Current Practices and Proposed Legislation,” American Business Law Journal, Fall 1981, vol. 19, No. 3, p. 319.
“Fraud Alert | Learn How”. Fight Identity Theft. http://www.fightidentitytheft.com/flag.html, accessed on Nov. 5, 2009.
Garcia-Molina et al., “Database Systems: The Complete Book”, Prentice Hall, Inc., Ch. 15, Oct. 1, 2001, pp. 713-715.
Gibbs, Adrienne; “Protecting Your Children from Identity Theft,” Nov. 25, 2008, http://www.creditcards.com/credit-card-news/identity-ID-theft-and-kids-children-1282.php, pp. 4.
“GLBA Compliance and FFIEC Compliance” http://www.trustwave.com/financial-services.php printed Apr. 8, 2013 in 1 page.
Gordon et al., “Identity Fraud: A Critical National and Global Threat,” LexisNexis, Oct. 28, 2003, pp. 1-48.
Haglund, Christoffer, “Two-Factor Authentication with a Mobile Phone”, Fox Technologies, Uppsala, Department of Information Technology, Nov. 2, 2007, pp. 62.
Herzberg, Amir, “Payments and Banking with Mobile Personal Devices,” Communications of the ACM, May 2003, vol. 46, No. 5, pp. 53-58.
“ID Analytics ID Network”, from www.idanalytics.com, as retrieved from www.archive.org, dated Nov. 20, 2005 or earlier; attached as “ID Network (IDN)”, pp. 8.
ID Cops, www.idcops.com; retrieved from www.archive.org any linkage Feb. 16, 2007.
ID Theft Assist, “Do You Know Where Your Child's Credit Is?”, Nov. 26, 2007, http://www.idtheftassist.com/pages/story14, pp. 3.
“ID Thieves These Days Want Your Number Not Your Name”, The Columbus Dispatch, Columbus, Ohio, http://www.dispatch.com/content/stories/business/2014/08/03/id-thieves-these-days-want-your-number-not-your-name.html, Aug. 3, 2014 in 2 pages.
Identity Theft Resource Center; Fact Sheet 120 A—To Order a Credit Report for a Child; Fact Sheets, Victim Resources; Apr. 30, 2007.
“Identity Thieves Beware: Lifelock Introduces Nation's First Guaranteed Proactive Solution to Identity Theft Protection,” PR Newswire, New York, Jun. 13, 2005 http://proquest.umi.com/pqdweb?did=852869731&sid=1&Fmt=3&clientid=19649&RQT=309&Vname=PQD.
Ideon, Credit-Card Registry that Bellyflopped this Year, Is Drawing some Bottom-Fishers, The Wall Street Journal, Aug. 21, 1995, pp. C2.
“Industry News, New Technology Identifies Mortgage Fraud: Basepoint Analytics Launches FraudMark”, Inman News, American Land Title Association, Oct. 5, 2005, pp. 1.
Information Brokers of America, “Information Brokers of America Child Identity Theft Protection” http://web.archive.org/web/20080706135451/http://iboainfo.com/child-order.html as archived Jul. 6, 2008 in 1 page.
Information Brokers of America, “Safeguard Your Child's Credit”, http://web.archive.org/web/20071215210406/http://www.iboainfo.com/child-id-protect.html as archived Dec. 15, 2007 in 1 page.
“Intelligent Miner Applications Guide”, IBM Corp., Apr. 2, 1999, Chapters 4-7, pp. 33-132.
“Intersections, Inc. Identity Guard”, from www.intersections.com and www.identityguard.com, as retrieved from Internet Archive, dated Nov. 25, 2005 or earlier; attached as “Identity Guard (IDG)”, pp. 7.
Iovation, Device Identification & Device Fingerprinting, http://www.iovation.com/risk-management/device-identification printed Nov. 5, 2012 in 6 pages.
Jacob et al., A Case Study of Checking Account Inquiries and Closures in Chicago, The Center for Financial Services Innovation, Nov. 2006.
Jin et al., “Network Security Risks in Online Banking”, 2005 International Conference on Wireless Communications, Networking and Mobile Computing, Jan. 2005, vol. 2, pp. 1229-1234.
Karlan et al., “Observing Unobservables:ldentifying Information Asymmetries with a Consumer Credit Field Experiment”, Jun. 17, 2006, pp. 58, http://aida.econ.yale.edu/karlan/papers/ObservingUnobservables.KarlanZinman.pdf.
Khan, Muhammad Khurram, PhD., “An Efficient and Secure Remote Mutual Authentication Scheme with Smart Cards” IEEE International Symposium on Biometrics & Security Technologies (ISBAST), Apr. 23-24, 2008, pp. 1-6.
Lamons, Bob, “Be Smart: Offer Inquiry Qualification Services,” Marketing News, ABI/Inform Global, Nov. 6, 1995, vol. 29, No. 23, pp. 13.
Lee, Timothy B., “How America's Broken Tax System Makes Identity Theft Easy”, http://www.vox.com/2014/4/14/5608072/how-americas-broken-tax-system-makes-identity-theft-easy, Apr. 14, 2014, pp. 10.
Lee, W.A.; “Experian, on Deal Hunt, Nets Identity Theft Insurer”, American Banker: The Financial Services Daily, Jun. 4, 2003, New York, NY, 1 page.
Lefebvre et al., “A Robust Soft Hash Algorithm for Digital Image Signature”, International Conference on Image Processing 2:11 (ICIP), vol. 3, Oct. 2003, pp. 495-498.
Lifelock, “How LifeLock Works,” http://www.lifelock.com/lifelock-for-people printed Mar. 14, 2008 in 1 page.
Lifelock, “LifeLock Launches First ID Theft Prevention Program for the Protection of Children,” Press Release, Oct. 14, 2005, http://www.lifelock.com/about-us/press-room/2005-press-releases/lifelock-protection-for-children.
LifeLock; “How Can LifeLock Protect My Kids and Family?” http://www.lifelock.com/lifelock-for-people/how-we-do-it/how-can-lifelock-protect-my-kids-and-family printed Mar. 14, 2008 in 1 page.
Lifelock, “Personal Identity Theft Protection & Identity Theft Products,” http://www.lifelock.com/lifelock-for-people, accessed Nov. 5, 2007.
Lifelock, Various Pages, www.lifelock.com/, Jan. 9, 2007, pp. 49.
My Call Credit http://www.mycallcredit.com/products.asp?product=ALR dated Dec. 10, 2005 on www.archive.org.
My Call Credit http://www.mycallcredit.com/rewrite.asp?display=faq dated Dec. 10, 2005 on www.archive.org.
MyReceipts, http://www.myreceipts.com/, printed Oct. 16, 2012 in 1 page.
MyReceipts—How it Works, http://www.myreceipts.com/howItWorks.do, printed Oct. 16, 2012 in 1 page.
National Alert Registry Launches RegisteredOffendersList.org to Provide Information on Registered Sex Offenders, May 16, 2005, pp. 2, http://www.prweb.com/printer/240437.htm accessed on Oct. 18, 2011.
National Alert Registry Offers Free Child Safety “Safe From Harm” DVD and Child Identification Kit, Oct. 24, 2006. pp. 2, http://www.prleap.com/pr/53170 accessed on Oct. 18, 2011.
National Alert Registry website titled, “Does a sexual offender live in your neighborhood”, Oct. 22, 2006, pp. 2, http://web.archive.org/wb/20061022204835/http://www.nationallertregistry.com/ accessed on Oct. 13, 2011.
Ogg, Erica, “Apple Cracks Down on UDID Use”, http://gigaom.com/apple/apple-cracks-down-on-udid-use/ printed Nov. 5, 2012 in 5 Pages.
Organizing Maniac's Blog—Online Receipts Provided by MyQuickReceipts.com, http://organizingmaniacs.wordpress.com/2011/01/12/online-receipts-provided-by-myquickreceipts.com/ dated Jan. 12, 2011 printed Oct. 16, 2012 in 3 pages.
Pagano, et al., “Information Sharing in Credit Markets,” Dec. 1993, The Journal of Finance, vol. 48, No. 5, pp. 1693-1718.
Partnoy, Frank, Rethinking Regulation of Credit Rating Agencies: An Institutional Investor Perspective, Council of Institutional Investors, Apr. 2009, pp. 21.
Planet Receipt—Home, http://www.planetreceipt.com/home printed Oct. 16, 2012 in 1 page.
Planet Receipt—Solutions & Features, http://www.planetreceipt.com/solutions-features printed Oct. 16, 2012 in 2 pages.
“PremierGuide Announces Release 3.0 of Local Search Platform”, Business Wire, Mar. 4, 2004, Palo Alto, CA, p. 5574.
Press Release—“Helping Families Protect Against Identity Theft—Experian Announces FamilySecure.com; Parents and guardians are alerted for signs of potential identity theft for them and their children; product features an industry-leading $2 million guarantee”; PR Newswire; Irvine, CA; Oct. 1, 2007.
Privacy Rights Clearinghouse, “Identity Theft: What to do if it Happens to You,” http://web.archive.org/web/19990218180542/http://privacyrights.org/fs/fs 17a.htm printed Feb. 18, 1999.
Quinn, Tom, “Low Credit Inquiries Affect Your Credit Score”, Credit.com, May 2, 2011, pp. 2.
Rivera, Barbara, “New Tools for Combating Income Tax Refund Fraud”, https://gcn.com/Articles/2014/05/08/lnsight-tax-fraud-tools.aspx?Page=1, May 8, 2014, pp. 3.
Scholastic Inc.:Parent's Request for Information http://web.archive.org/web/20070210091055/http://www.scholastic.com/inforequest/index.htm as archived Feb. 10, 2007 in 1 page.
Scholastic Inc.Privacy Policy http://web.archive.org/web/20070127214753/http://www.scholastic.com/privacy.htm as archived Jan. 27, 2007 in 3 pages.
Shoeboxed, https://www.shoeboxed.com/sbx-home/ printed Oct. 16, 2012 in 4 pages.
Singletary, Michelle, “The Littlest Victims of ID Theft”, The Washington Post, The Color of Money, Oct. 4, 2007.
Sumner, Anthony, “Tackling the Issue of Bust-Out Fraud”, Retail Banker International, Jul. 24, 2007, pp. 4.
Sumner, Anthony, “Tackling the Issue of Bust-Out Fraud”, Experian: Decision Analytics, Dec. 18, 2007, pp. 24.
Sumner, Anthony, “Tackling the Issue of Bust-Out Fraud”, e-News, Experian: Decision Analytics, pp. 4, [Originally Published in Retail Banker International Magazine Jul. 24, 2007].
“The Return Review: Program Increases Fraud Detection; However, Full Retirement of the Electronic Fraud Detection System Will be Delayed”, Treasury Inspector General for Tax Administration, Sep. 25, 2017, Reference No. 2017-20-080, pp. 27.
Themorningcall.Com, “Cheap Ways to Foil Identity Theft,” www.mcall.com/business/columnists/all-karp.5920748jul01,0 . . . , published Jul. 1, 2007.
“TransUnion—Child Identity Theft Inquiry”, TransUnion, http://www.transunion.com/corporate/personal/fraudIdentityTheft/fraudPrevention/childIDInquiry.page as printed Nov. 5, 2009 in 4 pages.
Truston, “Checking if your Child is an ID Theft Victim can be Stressful,” as posted by Michelle Pastor on Jan. 22, 2007 at http://www.mytruston.com/blog/credit/checking_if_your_child_is_an_id_theft_vi.html.
Vamosi, Robert, “Howto Handle ID Fraud's Youngest Victims,” Nov. 21, 2008, http://news.cnet.com/8301-10789_3-10105303-57.html.
Various Posts from the http://www.2p.wrox.com Forums: http://web.archive.org/web/2005045221950/http://p2p.wrox.com/topic.asp?TOPIC_ID=6513, dated Nov. 15, 2003-Oct. 7, 2004.
Web Page posted at: http://web.archive.org/web20040805124909/http://www.oracle.com/technology/sample_codete/tech/pl_sql/htdocs/x/Case/start.htm, pp. 1 and 4 of the webpages posted on Jan. 7, 2003.
Webpage printed out from http://www.jpmorgan.com/cm/ContentServer?c=TS_Content&pagename=jpmorgan%2Fts%2FTS_Content%2FGeneral&cid=1139403950394 on Mar. 20, 2008, Feb. 13, 2006, New York, NY.
Wilson, Andrea, “Escaping the Alcatraz of Collections and Charge-Offs”, http://www.transactionworld.net/articles/2003/october/riskMgmt1.asp, Oct. 2003.
International Search Report and Written Opinion for Application No. PCT/US2007/06070, dated Nov. 10, 2008.
International Search Report and Written Opinion for Application No. PCT/US2008/064594, dated Oct. 30, 2008.
International Preliminary Report and Written Opinion in PCT/US2008/064594, dated Dec. 10, 2009.
International Search Report and Written Opinion for Application No. PCT/US09/60393, dated Dec. 23, 2009.
International Search Report and Written Opinion for Application No. PCT/US09/37565, dated May 12, 2009.
International Search Report and Written Opinion for Application No. PCT/US2010/034434, dated Jun. 23, 2010.
International Preliminary Report on Patentability for Application No. PCT/US2010/034434, dated Feb. 4, 2014.
Official Communication in Australian Patent Application No. 2012217565, dated May 12, 2017.
Official Communication in Australian Patent Application No. 2017203586, dated Jun. 18, 2019.
Official Communication in Australian Patent Application No. 2019279982, dated Dec. 19, 2019.
Official Communication in Canadian Patent Application No. 2,827,478, dated Jun. 29, 2017.
Official Communication in Canadian Patent Application No. 2,827,478, dated May 31, 2018.
Official Communication in Canadian Patent Application No. 2,827,478, dated Mar. 27, 2019.
Extended European Search Report for Application No. EP12747205, dated Sep. 25, 2014.
Supplementary European Search Report for Application No. EP12747205, dated Jun. 19, 2015.
Extended European Search Report for Application No. EP18748000, dated Dec. 13, 2018.
International Search Report and Written Opinion for Application No. PCT/US2012/025456, dated May 21, 2012.
International Preliminary Report on Patentability in Application No. PCT/US2012/025456, dated Aug. 21, 2013.
International Search Report and Written Opinion for Application No. PCT/US2011/033940, dated Aug. 22, 2011.
Allard et al., “Safe Realization of the Generalization Privacy Mechanism”, 2011 Ninth Annual International Conference on Privacy, Security and Trust, pp. 8.
“Dealing with Measurement Noise (A Gentle Introduction to Noise Filtering)”, Chemical and Process Engineering, University of Newcastle Upon Tyne, https://web.archive.org/web/20000418021742/http://lorien.ncl.ac.uk/ming/filter/filewma.htm, Archived Apr. 18, 2000, pp. 3.
El Kalam et al., “Personal Data Anonymization for Security and Privacy in Collaborative Environments”, 2005 IEEE, pp. 56-61.
Ribeiro et al., “Privacy Protection with Pseudonumization and Anonumization in a Health IoT System”, Results from OCARIoT, 2019 IEEE, pp. 904-908.
U.S. Appl. No. 13/665,636, Pre-Data Breach Monitoring, filed Oct. 31, 2012.
U.S. Appl. No. 16/657,057, U.S. Pat. No. 11,030,562, Pre-Data Breach Monitoring, Oct. 18, 2019.
Provisional Applications (1)
Number Date Country
61553761 Oct 2011 US
Continuations (2)
Number Date Country
Parent 16657057 Oct 2019 US
Child 17313775 US
Parent 13665636 Oct 2012 US
Child 16657057 US