Identity Protection
Some embodiments provide holistic and comprehensive identity protection solutions. The solutions protect user identity by screening the information trail that a user leaves behind online in order to suppress or neutralize information crumbs that can subsequently be used to harm the user. The solutio...
Gespeichert in:
Hauptverfasser: | , , , |
---|---|
Format: | Patent |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | Some embodiments provide holistic and comprehensive identity protection solutions. The solutions protect user identity by screening the information trail that a user leaves behind online in order to suppress or neutralize information crumbs that can subsequently be used to harm the user. The solutions audit user privacy settings, established online friends and contacts, and friend and contact activity online to limit the exposure and disclosure of user information online. The solutions perform white-hat penetration tests. The solutions report on user risk based on available online information. The solutions validate completed transactions based on monitored user movements and site visits. The solutions provide a crowd-sourced approach to identify risk based on common transactions and visits of others. The solutions prevent identity theft by verifying that disbursements are made to the correct entity. |
---|