Patents by Inventor Joel Carleton

Joel Carleton has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11580259
    Abstract: Embodiments of various systems and methods described herein provide an identity security database analytics system which is configured to provide security alerts to a user. The security alerts can include for personalized metrics related to potential identity theft incidents. The personalized metrics can include user specific information on security breaches of the user's personal information as well as depersonalized statistics generated based on information of other users having one or more similar characteristics of the user.
    Type: Grant
    Filed: September 16, 2021
    Date of Patent: February 14, 2023
    Assignee: CSIDENTITY CORPORATION
    Inventors: Adam Kennedy, Bryan Hjelm, Jay Jarvinen, Tom Stambaugh, Joel Carleton, Iris Connealy-Seri
  • Publication number: 20220327541
    Abstract: One or more implementations include methods, systems, and/or devices to help protect consumers from fraudulent activity using compromised PII. For example, systems and methods can be implemented that enable the detection and prevention of consumer-focused identity theft, generates a risk score and is powered by a predictive model using machine learning techniques and tools and presents information and recommended action a user can take in reports.
    Type: Application
    Filed: April 8, 2022
    Publication date: October 13, 2022
    Inventors: Victor Seguritan, Brian Michael Stack, Joel Carleton, David Burdelski
  • Patent number: 11157650
    Abstract: Embodiments of various systems and methods described herein provide an identity security database analytics system which is configured to provide security alerts to a user. The security alerts can include for personalized metrics related to potential identity theft incidents. The personalized metrics can include user specific information on security breaches of the user's personal information as well as depersonalized statistics generated based on information of other users having one or more similar characteristics of the user.
    Type: Grant
    Filed: May 21, 2020
    Date of Patent: October 26, 2021
    Assignee: CSIDENTITY CORPORATION
    Inventors: Adam Kennedy, Bryan Hjelm, Jay Jarvinen, Tom Stambaugh, Joel Carleton, Iris Connealy-Seri
  • Patent number: 10699028
    Abstract: Embodiments of various systems and methods described herein provide an identity security database analytics system which is configured to provide security alerts to a user. The security alerts can include for personalized metrics related to potential identity theft incidents. The personalized metrics can include user specific information on security breaches of the user's personal information as well as depersonalized statistics generated based on information of other users having one or more similar characteristics of the user.
    Type: Grant
    Filed: June 19, 2018
    Date of Patent: June 30, 2020
    Assignee: CSIDENTITY CORPORATION
    Inventors: Adam Kennedy, Bryan Hjelm, Jay Jarvinen, Tom Stambaugh, Joel Carleton, Iris Connealy-Seri
  • Patent number: 10593004
    Abstract: In one embodiment, a method includes generating, by a computer system, a search-engine query from stored identity-theft nomenclature. The method also includes querying, by the computer system, at least one search engine via the search-engine query. Further, the method includes crawling, by the computer system, at least one computer-network resource identified via the querying. In addition, the method includes collecting, by the computer system, identity-theft information from the at least one computer-network resource. Additionally, the method includes processing, by the computer system, the identity-theft information for compromised personally-identifying information (PII).
    Type: Grant
    Filed: June 16, 2017
    Date of Patent: March 17, 2020
    Assignee: CSIDENTITY CORPORATION
    Inventors: Harold E. Gottschalk, Jr., Michael Caldwell, Joel Carleton
  • Publication number: 20180130157
    Abstract: In one embodiment, a method includes generating, by a computer system, a search-engine query from stored identity-theft nomenclature. The method also includes querying, by the computer system, at least one search engine via the search-engine query. Further, the method includes crawling, by the computer system, at least one computer-network resource identified via the querying. In addition, the method includes collecting, by the computer system, identity-theft information from the at least one computer-network resource. Additionally, the method includes processing, by the computer system, the identity-theft information for compromised personally-identifying information (PII).
    Type: Application
    Filed: June 16, 2017
    Publication date: May 10, 2018
    Inventors: Harold E. Gottschalk, JR., Michael Caldwell, Joel Carleton
  • Patent number: 9710868
    Abstract: In one embodiment, a method includes generating, by a computer system, a search-engine query from stored identity-theft nomenclature. The method also includes querying, by the computer system, at least one search engine via the search-engine query. Further, the method includes crawling, by the computer system, at least one computer-network resource identified via the querying. In addition, the method includes collecting, by the computer system, identity-theft information from the at least one computer-network resource. Additionally, the method includes processing, by the computer system, the identity-theft information for compromised personally-identifying information (PII).
    Type: Grant
    Filed: November 2, 2016
    Date of Patent: July 18, 2017
    Assignee: CSIdentity Corporation
    Inventors: Harold E. Gottschalk, Jr., Michael Caldwell, Joel Carleton
  • Publication number: 20170053369
    Abstract: In one embodiment, a method includes generating, by a computer system, a search-engine query from stored identity-theft nomenclature. The method also includes querying, by the computer system, at least one search engine via the search-engine query. Further, the method includes crawling, by the computer system, at least one computer-network resource identified via the querying. In addition, the method includes collecting, by the computer system, identity-theft information from the at least one computer-network resource. Additionally, the method includes processing, by the computer system, the identity-theft information for compromised personally-identifying information (PII).
    Type: Application
    Filed: November 2, 2016
    Publication date: February 23, 2017
    Applicant: CSIDENTITY CORPORATION
    Inventors: Harold E. Gottschalk, JR., Michael Caldwell, Joel Carleton
  • Patent number: 9558368
    Abstract: In one embodiment, a method includes generating, by a computer system, a search-engine query from stored identity-theft nomenclature. The method also includes querying, by the computer system, at least one search engine via the search-engine query. Further, the method includes crawling, by the computer system, at least one computer-network resource identified via the querying. In addition, the method includes collecting, by the computer system, identity-theft information from the at least one computer-network resource. Additionally, the method includes processing, by the computer system, the identity-theft information for compromised personally-identifying information (PII).
    Type: Grant
    Filed: November 2, 2015
    Date of Patent: January 31, 2017
    Assignee: CSIDENTITY CORPORATION
    Inventors: Harold E. Gottschalk, Jr., Michael Caldwell, Joel Carleton
  • Publication number: 20160055350
    Abstract: In one embodiment, a method includes generating, by a computer system, a search-engine query from stored identity-theft nomenclature. The method also includes querying, by the computer system, at least one search engine via the search-engine query. Further, the method includes crawling, by the computer system, at least one computer-network resource identified via the querying. In addition, the method includes collecting, by the computer system, identity-theft information from the at least one computer-network resource. Additionally, the method includes processing, by the computer system, the identity-theft information for compromised personally-identifying information (PII).
    Type: Application
    Filed: November 2, 2015
    Publication date: February 25, 2016
    Applicant: CSIDENTITY CORPORATION
    Inventors: Harold E. Gottschalk, JR., Michael Caldwell, Joel Carleton
  • Patent number: 9235728
    Abstract: In one embodiment, a method includes generating, by a computer system, a search-engine query from stored identity-theft nomenclature. The method also includes querying, by the computer system, at least one search engine via the search-engine query. Further, the method includes crawling, by the computer system, at least one computer-network resource identified via the querying. In addition, the method includes collecting, by the computer system, identity-theft information from the at least one computer-network resource. Additionally, the method includes processing, by the computer system, the identity-theft information for compromised personally-identifying information (PII).
    Type: Grant
    Filed: February 16, 2012
    Date of Patent: January 12, 2016
    Assignee: CSIDENTITY CORPORATION
    Inventors: Harold E. Gottschalk, Jr., Michael Caldwell, Joel Carleton
  • Publication number: 20120215758
    Abstract: In one embodiment, a method includes generating, by a computer system, a search-engine query from stored identity-theft nomenclature. The method also includes querying, by the computer system, at least one search engine via the search-engine query. Further, the method includes crawling, by the computer system, at least one computer-network resource identified via the querying. In addition, the method includes collecting, by the computer system, identity-theft information from the at least one computer-network resource. Additionally, the method includes processing, by the computer system, the identity-theft information for compromised personally-identifying information (PII).
    Type: Application
    Filed: February 16, 2012
    Publication date: August 23, 2012
    Inventors: Harold E. Gottschalk, JR., Michael Caldwell, Joel Carleton