Patents by Inventor Harold E. Gottschalk, JR.

Harold E. Gottschalk, JR. has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10593004
    Abstract: In one embodiment, a method includes generating, by a computer system, a search-engine query from stored identity-theft nomenclature. The method also includes querying, by the computer system, at least one search engine via the search-engine query. Further, the method includes crawling, by the computer system, at least one computer-network resource identified via the querying. In addition, the method includes collecting, by the computer system, identity-theft information from the at least one computer-network resource. Additionally, the method includes processing, by the computer system, the identity-theft information for compromised personally-identifying information (PII).
    Type: Grant
    Filed: June 16, 2017
    Date of Patent: March 17, 2020
    Assignee: CSIDENTITY CORPORATION
    Inventors: Harold E. Gottschalk, Jr., Michael Caldwell, Joel Carleton
  • Publication number: 20180130157
    Abstract: In one embodiment, a method includes generating, by a computer system, a search-engine query from stored identity-theft nomenclature. The method also includes querying, by the computer system, at least one search engine via the search-engine query. Further, the method includes crawling, by the computer system, at least one computer-network resource identified via the querying. In addition, the method includes collecting, by the computer system, identity-theft information from the at least one computer-network resource. Additionally, the method includes processing, by the computer system, the identity-theft information for compromised personally-identifying information (PII).
    Type: Application
    Filed: June 16, 2017
    Publication date: May 10, 2018
    Inventors: Harold E. Gottschalk, JR., Michael Caldwell, Joel Carleton
  • Patent number: 9710868
    Abstract: In one embodiment, a method includes generating, by a computer system, a search-engine query from stored identity-theft nomenclature. The method also includes querying, by the computer system, at least one search engine via the search-engine query. Further, the method includes crawling, by the computer system, at least one computer-network resource identified via the querying. In addition, the method includes collecting, by the computer system, identity-theft information from the at least one computer-network resource. Additionally, the method includes processing, by the computer system, the identity-theft information for compromised personally-identifying information (PII).
    Type: Grant
    Filed: November 2, 2016
    Date of Patent: July 18, 2017
    Assignee: CSIdentity Corporation
    Inventors: Harold E. Gottschalk, Jr., Michael Caldwell, Joel Carleton
  • Publication number: 20170053369
    Abstract: In one embodiment, a method includes generating, by a computer system, a search-engine query from stored identity-theft nomenclature. The method also includes querying, by the computer system, at least one search engine via the search-engine query. Further, the method includes crawling, by the computer system, at least one computer-network resource identified via the querying. In addition, the method includes collecting, by the computer system, identity-theft information from the at least one computer-network resource. Additionally, the method includes processing, by the computer system, the identity-theft information for compromised personally-identifying information (PII).
    Type: Application
    Filed: November 2, 2016
    Publication date: February 23, 2017
    Applicant: CSIDENTITY CORPORATION
    Inventors: Harold E. Gottschalk, JR., Michael Caldwell, Joel Carleton
  • Patent number: 9558368
    Abstract: In one embodiment, a method includes generating, by a computer system, a search-engine query from stored identity-theft nomenclature. The method also includes querying, by the computer system, at least one search engine via the search-engine query. Further, the method includes crawling, by the computer system, at least one computer-network resource identified via the querying. In addition, the method includes collecting, by the computer system, identity-theft information from the at least one computer-network resource. Additionally, the method includes processing, by the computer system, the identity-theft information for compromised personally-identifying information (PII).
    Type: Grant
    Filed: November 2, 2015
    Date of Patent: January 31, 2017
    Assignee: CSIDENTITY CORPORATION
    Inventors: Harold E. Gottschalk, Jr., Michael Caldwell, Joel Carleton
  • Publication number: 20160055350
    Abstract: In one embodiment, a method includes generating, by a computer system, a search-engine query from stored identity-theft nomenclature. The method also includes querying, by the computer system, at least one search engine via the search-engine query. Further, the method includes crawling, by the computer system, at least one computer-network resource identified via the querying. In addition, the method includes collecting, by the computer system, identity-theft information from the at least one computer-network resource. Additionally, the method includes processing, by the computer system, the identity-theft information for compromised personally-identifying information (PII).
    Type: Application
    Filed: November 2, 2015
    Publication date: February 25, 2016
    Applicant: CSIDENTITY CORPORATION
    Inventors: Harold E. Gottschalk, JR., Michael Caldwell, Joel Carleton
  • Patent number: 9237152
    Abstract: A method includes receiving data related to an individual, the data comprising a plurality of elements of personally-identifying information (PII). The method further includes building, via the plurality of elements of the PII, a compositional key for the individual. In addition, the method includes storing the compositional key and a biometric print for the individual as a biometric record in a biometric repository. The method also includes, via the compositional key, providing a plurality of federated entity (FE) computer systems with access to the biometric repository.
    Type: Grant
    Filed: June 14, 2014
    Date of Patent: January 12, 2016
    Assignee: CSIDENTITY CORPORATION
    Inventor: Harold E. Gottschalk Jr.
  • Patent number: 9235728
    Abstract: In one embodiment, a method includes generating, by a computer system, a search-engine query from stored identity-theft nomenclature. The method also includes querying, by the computer system, at least one search engine via the search-engine query. Further, the method includes crawling, by the computer system, at least one computer-network resource identified via the querying. In addition, the method includes collecting, by the computer system, identity-theft information from the at least one computer-network resource. Additionally, the method includes processing, by the computer system, the identity-theft information for compromised personally-identifying information (PII).
    Type: Grant
    Filed: February 16, 2012
    Date of Patent: January 12, 2016
    Assignee: CSIDENTITY CORPORATION
    Inventors: Harold E. Gottschalk, Jr., Michael Caldwell, Joel Carleton
  • Publication number: 20150295924
    Abstract: A method includes receiving data related to an individual, the data comprising a plurality of elements of personally-identifying information (PII). The method further includes building, via the plurality of elements of the PII, a compositional key for the individual. In addition, the method includes storing the compositional key and a biometric print for the individual as a biometric record in a biometric repository. The method also includes, via the compositional key, providing a plurality of federated entity (FE) computer systems with access to the biometric repository.
    Type: Application
    Filed: June 14, 2014
    Publication date: October 15, 2015
    Inventor: Harold E. Gottschalk, JR.
  • Patent number: 8819793
    Abstract: A method includes receiving data related to an individual, the data comprising a plurality of elements of personally-identifying information (PII). The method further includes building, via the plurality of elements of the PII, a compositional key for the individual. In addition, the method includes storing the compositional key and a biometric print for the individual as a biometric record in a biometric repository. The method also includes, via the compositional key, providing a plurality of federated entity (FE) computer systems with access to the biometric repository.
    Type: Grant
    Filed: September 20, 2011
    Date of Patent: August 26, 2014
    Assignee: CSIdentity Corporation
    Inventor: Harold E. Gottschalk, Jr.
  • Publication number: 20130074166
    Abstract: A method includes receiving data related to an individual, the data comprising a plurality of elements of personally-identifying information (PII). The method further includes building, via the plurality of elements of the PII, a compositional key for the individual. In addition, the method includes storing the compositional key and a biometric print for the individual as a biometric record in a biometric repository. The method also includes, via the compositional key, providing a plurality of federated entity (FE) computer systems with access to the biometric repository.
    Type: Application
    Filed: September 20, 2011
    Publication date: March 21, 2013
    Inventor: Harold E. Gottschalk, JR.
  • Publication number: 20120215758
    Abstract: In one embodiment, a method includes generating, by a computer system, a search-engine query from stored identity-theft nomenclature. The method also includes querying, by the computer system, at least one search engine via the search-engine query. Further, the method includes crawling, by the computer system, at least one computer-network resource identified via the querying. In addition, the method includes collecting, by the computer system, identity-theft information from the at least one computer-network resource. Additionally, the method includes processing, by the computer system, the identity-theft information for compromised personally-identifying information (PII).
    Type: Application
    Filed: February 16, 2012
    Publication date: August 23, 2012
    Inventors: Harold E. Gottschalk, JR., Michael Caldwell, Joel Carleton
  • Publication number: 20110260832
    Abstract: In one embodiment, a method includes enrolling a potential enrollee for an identity-monitoring service. The enrolling includes acquiring personally-identifying information (PII) and capturing a voiceprint. Following successful completion of the enrolling, the potential enrollee is an enrollee. The method further includes, responsive to an identified suspicious event related to the PII, creating an identity alert, establishing voice communication with an individual purporting to be the enrollee, and performing voice-biometric verification of the individual. The voice-biometric verification includes comparing one or more spoken utterances with the voiceprint. Following successful completion of the voice-biometric verification, the individual is a verified enrollee. In addition, the method includes authorizing delivery of the identity alert to the verified enrollee.
    Type: Application
    Filed: April 25, 2011
    Publication date: October 27, 2011
    Inventors: Joe Ross, Isaac Chapa, Adrian Cruz, Harold E. Gottschalk, JR.