Patent Issued for Systems and methods for managing private information (USPTO 11861036): United Services Automobile Association
2024 JAN 18 (NewsRx) -- By a
The patent’s assignee for patent number 11861036 is
News editors obtained the following quote from the background information supplied by the inventors: “The present disclosure relates generally to methods and systems to facilitate managing private data (e.g., personal identifying information). More specifically, the methods and systems described herein relate to safeguarding private data.
“This section is intended to introduce the reader to various aspects of art that may be related to various aspects of the present disclosure, which are described and/or claimed below. This discussion is believed to be helpful in providing the reader with background information to facilitate a better understanding of the various aspects of the present disclosure. Accordingly, it may be understood that these statements are to be read in this light, and not as admissions of prior art.
“The Internet has brought about a connected world, where information is easily shared and/or used. To facilitate this connected environment, tremendous amounts of personally-identifying data (e.g., hard-copy (paper) data and/or electronic data) are generated. Unfortunately, oftentimes, this information is not properly secured, resulting in vulnerabilities that nefarious actors can take advantage of. For example, such bad actors may use information to impersonate individuals to commit fraud or perform other bad acts. Oftentimes, individuals may be unaware of potential avenues of data capture for these nefarious actors, especially as these bad actors become increasingly sophisticated and private information becomes more valuable.”
As a supplement to the background information on this patent, NewsRx correspondents also obtained the inventors’ summary information for this patent: “Embodiments of this disclosure include systems and methods for informing and/or remediating potential avenues of nefarious capture of private data. In particular, the current techniques relate to an electronic service offering that is communicatively coupled to other systems where potential data breaches may occur. Upon analysis of the connected systems, automatic remediation events may be implemented, automatic notification events may be implemented, and/or an overall private data score may be generated, indicating a level of security for an individual’s private data. The overall private data score may be used to provide notifications to the individual, enabling the individual to see how safe their private data is (e.g., in comparison to other individuals). Further, the private data score may be used to alter product/service offerings and/or costs associated with the service offerings.”
The claims supplied by the inventors are:
“1. A tangible, non-transitory, computer readable medium comprising instructions that when executed by one or more processors of the computer cause the computer to: receive a private information protection (PIP) scoring request pertaining to a particular user; generate a PIP score by: capturing social media data of the particular user, by: identifying a social media profile of the particular user; accessing a social media page associated with the social media profile; and crawling underlying code of the social media page to identify private information of the particular user that is available on the social media page; aggregating the private information of the particular user that is available on the social media page to a set of PIP factors used in a PIP analysis; capturing settings associated with one or more Internet of Things (IOT) devices from one or more service providers of the IOT devices, by requesting the settings via an application programming interface (API) of the one or more service providers; aggregating the settings to the set of PIP factors; analyzing the private information of the particular user that is available on the social media page and the settings aggregated to the set of PIP factors to determine a level of private information disclosure; and identifying the PIP score based upon the analyzing the private information and settings aggregated to the set of PIP factors; present the PIP score to a graphical user interface, indicating a level of private information protection; provide the set of PIP factors to a machine learning engine configured to: receive sets of PIP factors associated with a plurality of users, and perform a machine learning analysis on the received sets of PIP factors to identify a previously unknown private information sharing pattern common to a subset of two or more of the plurality of users, and based upon the identified private information sharing pattern common to the subset of the plurality of users, provide a tailored notification via a second graphical user interface to a member of the subset of the plurality of users, indicating the identified private information sharing pattern.
“2. The non-transitory computer readable medium of claim 1, comprising instructions that when executed by the one or more processors cause the computer to: capture the social media data by accessing and crawling underlying code of a public social media profile view of a social media service; and identify the private information of the particular user that is available on the social media page in a context of the public social media profile view, wherein the context of the public social media profile view indicates different data as private information than a context of a private social media profile view.
“3. The non-transitory computer readable medium of claim 1, comprising instructions that when executed by the one or more processors cause the computer to: capture the social media data by accessing and crawling underlying code of a private social media profile view of a social media service; and identify the private information of the particular user that is available on the social media page in a context of the private social media profile view, wherein the context of the private social media profile view indicates different data as private information than a context of a public social media profile view.
“4. The non-transitory computer readable medium of claim 1, comprising instructions that when executed by the one or more processors cause the computer to: capture additional social media data by prompting for, via a data capture graphical user interface, and receiving an image snapshot of a social media view; performing optical character recognition (OCR) on the image snapshot of the social media view, and crawling text of results of the OCR for additional private information provided via the social media view.
“5. The non-transitory computer readable medium of claim 1, comprising instructions that when executed by the one or more processors cause the computer to: access a data store to identify known information about the particular user; compare the identified private information of the particular user that is available on the social media page with the known information about the particular user to determine whether the private information of the particular user that is available on the social media page is accurate; and adjust the PIP score based upon whether the private information of the particular user that is available on the social media page is accurate.
“6. The non-transitory computer readable medium of claim 5, comprising instructions that when executed by the one or more processors cause the computer to: negatively impact the PIP score when an accurate piece of personal information is disclosed to the public; and otherwise, retain the PIP score or positively impact the PIP score when an inaccurate piece of personal information is disclosed to the public.
“7. The non-transitory computer readable medium of claim 1, comprising instructions that when executed by the one or more processors cause the computer to: identify a magnitude of an audience with which the social media page is shared; weigh an adjustment to the PIP score based upon the magnitude of the audience of the social media page.
“8. The non-transitory computer readable medium of claim 1, comprising instructions that when executed by the one or more processors cause the computer to: capture and aggregate physical document data to the set of PIP factors by requesting, via a data capture graphical user interface, and receiving an image snapshot of physical documents; performing optical character recognition (OCR) on the physical documents to derive text of the physical documents; and identifying and aggregating factors of the derived text to the set of PIP factors.
“9. The non-transitory computer readable medium of claim 8, comprising instructions that when executed by the one or more processors cause the computer to: identify a sender of the physical document as one factor of the derived text; query a database to identify that the sender of the physical document is in the database; based upon the sender of the physical document being in the database, identify that the sender of the physical document is a predatory actor; and provide an electronic notification that the sender of the physical document has been identified as a predatory actor.
“10. The non-transitory computer readable medium of claim 1, comprising instructions that when executed by the one or more processors cause the computer to: present with the PIP score, in the graphical user interface, a remediation affordance that, when selected, navigates the particular user to an external page to complete a remediation.
“11. The non-transitory computer readable medium of claim 1, comprising instructions that when executed by the one or more processors cause the computer to: present one or more survey questions via a graphical user interface (GUI); and aggregate answers to the one or more survey questions to the set of PIP factors.
“12. The non-transitory computer readable medium of claim 11, comprising instructions that when executed by the one or more processors cause the computer to: identify a typical site usage pattern, a site entry point, or both for the particular user, who is to be presented the one or more survey questions; based upon the typical site usage pattern, the site entry point, or both, determine a number of survey questions to present; present only the number of survey questions, saving any remaining survey questions for a subsequent site visit.
“13. The non-transitory computer readable medium of claim 1, comprising instructions that when executed by the one or more processors cause the computer to: capture and aggregate physical security data regarding security associated with physical items of the particular user to the set of PIP factors.”
There are additional claims. Please visit full patent to read further.
For additional information on this patent, see: Comeaux, Jansey. Systems and methods for managing private information.
(Our reports deliver fact-based news of research and discoveries from around the world.)
Studies from University of Cincinnati Yield New Data on Risk Management (Index Insurance and the Moral Economy of Pastoral Risk Management In Mongolia): Risk Management
Patent Issued for Insurance risk scoring based on credit utilization ratio (USPTO 11861731): Cerner Innovation Inc.
Advisor News
Annuity News
Health/Employee Benefits News
Life Insurance News