Systems and methods of identity protection and management

作者: Mark Joseph Kapczynski , Michael Burger

DOI:

关键词: Risk levelExternal dataComputer securityIdentity protectionPersonally identifiable informationEngineeringComputing systemsService provider

摘要: In an embodiment, a computing system, such as monitoring computer, receives request from user to monitor account of the with online service provider. The may include personal information and preferences for one or more protective actions. system periodically monitors external data sources indications changes associated account, detects attempted account. determine risk levels detected changes, transmit notification via communication channel selected based on determined level and/or preferences. also initiate actions, so that further unauthorized access be prevented.

参考文章(1,695)