DATA BREACH SYSTEM AND METHOD
A method and system for apprising a consumer of an accumulated risk resulting from data breaches. The method and system may include determining one or more breach events for a consumer, generating an accumulated harm risk score for the consumer, optionally with the accumulated harm risk score providing a relative indicator of overall risk accumulated for the consumer as result of the breach events, identifying one or more potential harms for one or more of the breach events, optionally with the potential harms indicating a likely or probable impact, injury, or damage to the consumer from one or more of the breach events, and identifying one or more mitigation actions for one or more of the breach events, optionally with the mitigation actions detailing options available to the consumer for reducing risk associated with one or more of the potential harms.
Latest Sontiq, Inc. Patents:
This continuation application claims priority to and the benefit of U.S. Non-Provisional application Ser. No. 17/080,556 filed Oct. 26, 2020, U.S. Provisional Application No. 62/926,467 filed Oct. 26, 2019, U.S. patent application Ser. No. 16/638,046 filed Feb. 10, 2020, PCT Application No. PCT/US2018/047237 filed Aug. 21, 2018, and U.S. Provisional Application No. 62/548,656 filed Aug. 22, 2017, which are each hereby incorporated by reference in their entirety.
TECHNICAL FIELDThe present disclosure pertains to a system and methods for aggregating, searching and analyzing data breach information from multiple breach events to generate an aggregate breach profile of a consumer and to use the aggregated data breach information for data breach risk analysis and harm mitigation.
BACKGROUNDData breaches and data compromises are very different from one another with regard to both total relative risk and the specific nature of that risk to a consumer-victim of the breach, and as a result require prioritized and unique action steps be taken by a consumer-victim in response to notification of each breach or compromise of the consumer-victim's data. The accumulated risk and nature of harm to a consumer which has been a victim of multiple breaches may not be evident from analysis of each individual breach or compromise of the consumer-victim's data. As such, systems and tools are needed to analyze, predict, and mitigate risks and harms which can result from multiple breaches or compromises of a consumer-victim's data.
SUMMARYA system and methods for analyzing, predicting, and mitigating risks and harms which can result from multiple breaches or compromises of a consumer-victim's data is provided herein. In a non-limiting example, the system and methods described herein for aggregating and analyzing the risks and harms from multiple breaches utilize outputs generated by a data breach assessment system and methods as described in International Patent Application Number PCT/US2018/047237, published as WO 2019/040443, having common ownership and inventorship with the present disclosure, the contents of which are incorporated herein by reference. The data breach assessment system is also referred to herein as a data breach system, as a Breach Clarity™ (BC) system, and/or as a BC system. The outputs generated by the data breach assessment system described in WO 2019/040443 include, for example, an overall risk score generated for a specific breach and breach victim, which is also referred to herein as a data breach score and/or as a Breach Clarity™ (BC) score; a prioritized list of particular harms (such as tax refund fraud or existing credit card fraud) that are generated by an algorithm as the most likely, e.g., most probable, harms which can occur as a result of a particular breach event or combination or breach events, based on the unique characteristics of that particular breach or that particular combination of breach events; an element risk score for a harm associated with a breached information element, where the element risk score is generated using one or more algorithms applied to data associated in a data structure, and/or industry research including qualitative, quantitative and non-quantitative research, and stored in a data structure of the BC system; and a prioritized list of particular consumer fraud-mitigation action steps, which can include, for example, actions such as obtaining a credit freeze, setting a fraud alert, initiating credit monitoring, etc. that are ranked to generate an action set prioritized to identify the relatively strongest protective actions against the identified risks and harms for the particular breach. The outputs generated by the BC system are presented, e.g., displayed and/or outputted, to the consumer-victim via a user interface designed in one example, such that the consumer can view a consolidated display showing a BC score, identified risks, mitigation actions, and in one example, can action the mitigation actions and/or additional information via the user interface. This consolidation of outputs presented for the consumer's viewing and use presents an advantage to the consumer, in contrast with ad-hoc, unconsolidated, unprioritized, and/or generalized consumer data breach information which may not clearly identify to the consumer the severity of a breach action and/or the appropriate mitigation actions which should be taken in response.
One non-limiting aspect of the present disclosure relates to a method for apprising a consumer of an accumulated risk resulting from data breaches. The method may include receiving enrollment information for the consumer, generating a consumer profile breach history for the consumer based on the enrollment information, accessing an electronic transaction account associated with the consumer, optionally with the electronic transaction account configured to execute a consumer transaction between the consumer and a party to the consumer transaction, generating electronic transaction information for the consumer transaction, accessing breach information for a plurality of data breaches, comparing the electronic transaction information with the breach information to determine one or more breach events, optionally with the breach events representing a matching of the electronic transaction information with the breach information of a corresponding one of the data breaches, appending the consumer profile breach history with a breach listing, the breach listing identifying each of the breach events, and appending the consumer profile breach history with an accumulated harm risk score, optionally with the accumulated harm risk score providing a relative indicator of risk accumulated for the consumer as cumulative result of the breach events.
The method may include displaying the consumer profile breach history with the breach listing and the accumulated harm risk score via a consumer user interface operable on a computing device.
The method may include appending the consumer profile breach history to display one or more mitigation actions relative to one or more of the breach events, optionally with the mitigation actions detailing options available to the consumer for reducing risk and/or harm resulting from one or more of the breach events.
The method may include appending the consumer profile breach history to display one or more selectable links for the mitigation actions, optionally with the selectable links being selectable via the consumer user interface to direct the consumer to a resource interface for actioning a corresponding one of the mitigation actions.
The method may include prioritizing display of the mitigation actions to identify a relatively strongest one of mitigation actions, optionally with each remaining mitigation actions ordered thereafter according to a level strength.
The method according may include appending the consumer profile breach history to display one or more potential harms relative to one or more of the breach events, optionally with the potential harms detailing likely or probable impact, injury, or damage to the consumer from one or more of the breach events.
The method may include appending the consumer profile breach history to display an element risk score for each of the potential harms, optionally with the element risk scores providing a relative indicator of risk to the consumer for the corresponding one of the potential harms.
The method may include generating a breach notification to apprise the consumer of appending the consumer profile breach history with the breach events.
The method may include accessing the electronic transaction account via a network using an account plug-in for the electronic transaction account.
One non-limiting aspect of the present disclosure relates to a computer-readable storage medium storing a plurality of non-transitory instructions, which when executed with one or more processors of a computing system, are operable for identifying a consumer profile breach history for a consumer, retrieving electronic transaction information for the consumer, retrieving breach information for a plurality of data breaches, comparing the electronic transaction information with the breach information to determine one or more breach events, optionally with the breach events representing a matching of the electronic transaction information with the breach information of a corresponding one of the data breaches, and appending the consumer profile breach history with an accumulated harm risk score, the accumulated harm risk score providing a relative indicator of risk accumulated for the consumer as cumulative result of the breach events.
The non-transitory instructions may be operable for accessing an electronic transaction account associated with the consumer to via a network using an account plug-in for the electronic transaction account and retrieving the electronic transaction information from the electronic transaction account.
The non-transitory instructions may be operable for generating a consumer user interface to display the consumer profile breach history via a computing device associated with the consumer.
The non-transitory instructions may be operable for electronically transmitting a breach notification to the consumer, the breach notification including a selectable link for directing the computing device to the consumer user interface.
The non-transitory instructions may be operable for displaying within the consumer user interface a breach listing identifying each of the breach events.
The non-transitory instructions may be operable for displaying within the consumer user interface one or more potential harms for one or more of the breach events, the potential harms detailing likely or probable impact, injury, or damage to the consumer from one or more of the breach events.
The non-transitory instructions may be operable for displaying within the consumer user interface an element risk score for one or more of the potential harms, the element risk scores providing a relative indicator of risk to the consumer for the corresponding one of the potential harms.
The non-transitory instructions may be operable for displaying within the consumer user interface one or more mitigation actions for one or more of the breach events, the mitigation actions detailing options available to the consumer for reducing risk associated with one or more of the potential harms.
One non-limiting aspect of the present disclosure relates to a computer-readable storage medium storing a plurality of non-transitory instructions, which when executed with one or more processors of a computing system, are operable for determining one or more breach events for a consumer, generating an accumulated harm risk score for the consumer, optionally with the accumulated harm risk score providing a relative indicator of overall risk accumulated for the consumer as result of the breach events, identifying one or more potential harms for one or more of the breach events, the potential harms indicating a likely or probable impact, injury, or damage to the consumer from one or more of the breach events, and identifying one or more mitigation actions for one or more of the breach events, the mitigation actions detailing options available to the consumer for reducing risk associated with one or more of the potential harms.
The non-transitory instructions may be operable for generating consumer user interface to display a consumer profile breach history via a computing device associated with the consumer, the consumer profile breach history displaying the accumulated harm risk score, the potential harms, and the mitigation actions.
The non-transitory instructions may be operable for displaying within the consumer user interface an element risk score for one or more of the potential harms, optionally with the element risk scores providing a relative indicator of risk for the consumer as a result of the corresponding one of the potential harms.
The above noted and other features and advantages of the present disclosure are readily apparent from the following detailed descriptions when taken in connection with the accompanying drawings.
A system and methods for analyzing, predicting, and mitigating risks and harms which can result from multiple breaches or compromises of a consumer-victim's data is provided herein. In a non-limiting example, the system and methods described herein for aggregating and analyzing the risks and harms from multiple breaches utilize outputs generated by a data breach assessment system and methods as described in International Patent Application Number PCT/US2018/047237, published as WO 2019/040443, having common ownership and inventorship with the present disclosure, the contents of which are incorporated herein by reference. The outputs generated by the data breach assessment system described in WO 2019/040443 include, for example, an overall risk score 80 generated for a specific breach 70 and breach victim, which is also referred to herein as a data breach score 70 and/or as a Breach Clarity™ (BC) score 70; a prioritized list of particular harms 72 (such as tax refund fraud or existing credit card fraud) that are generated by an algorithm as the most likely, e.g., most probable, harms 72 which can occur as a result of a particular breach event 70 or combination or breach events 70, based on the unique characteristics of that particular breach 70 or that particular combination of breach events 70; an element risk score 74 for a harm 72 associated with a breached information element 68, where the element risk score 74 is generated using one or more algorithms applied to data associated in a data structure 22, and/or industry research including qualitative, quantitative and non-quantitative research, and stored in a data structure 22 of the BC system 100; and a prioritized list of particular consumer fraud-mitigation action steps 116, which can include, for example, actions such as obtaining a credit freeze, setting a fraud alert, initiating credit monitoring, etc. that are ranked using an action prioritization factor 136 to generate an action set for the breach event 70 which is prioritized to identify the relatively strongest protective actions 116 against the identified risks and harms 72 for the particular breach event 70. The outputs generated by the BC system 100 are presented, e.g., displayed and/or outputted, to the consumer-victim via a consumer user interface 90 designed in one example, such that the consumer can view a consolidated display showing a BC score 80, identified risks and harms 72, and mitigation actions 116. In an illustrative example, the consumer-victim can action the mitigation actions 116 by actuating an interface element 31 of the consumer user interface 90 and/or retrieve additional information via the consumer user interface 90. This consolidation of outputs presented for the consumer's viewing and use presents an advantage to the consumer, in contrast with ad-hoc, unconsolidated, unprioritized, and/or generalized consumer data breach information which may not clearly identify to the consumer the severity of a breach action and/or the appropriate mitigation actions which should be taken in response.
Referring to the drawings wherein like reference numbers represent like components throughout the several figures, the elements shown in
The term “data breach” as used herein is not to be limiting, and is to be construed broadly to comprise any incident in which data has been exposed in a manner which creates a possibility or potential for harm, hurt, loss and/or injury to the data owner, including, for example, identity theft, financial loss, loss of privacy, extortion, etc. A “data breach” as that term is used herein, may also be referred to, and/or comprise, one or more of a data theft, data compromise, unauthorized data access, unauthorized data exposure, a data hack, a data intrusion, a data penetration, physical lost or stolen personally identifiable information, etc. A “data breach” may also be referred to herein as a “data compromise” and/or as a “breach event.” In an illustrative example, the information elements 68 which can be breached and/or compromised can include one or more of personally identifiable information (PII), protected health information (PHI), payment card industry (PCI) data, and other such information which can, if breached and/or compromised, expose the breached victim to risk, injury, and/or harm.
The data breach system 100 described herein uses a plurality of data structures 22, tabulation formats, quantitative and qualitative research, and algorithms 10 that are used in combination to compute risk-related outputs designed to minimize risk for consumers, which can be outputted to a consumer via a consumer user interface (UI) 128 of a consumer user device 30, and/or to an sponsoring entity or institution 50, such as a banking institution or other financial services provider, health services provider, or other resource provider 50 engaged in providing a service or product to consumers, via one or more institution user interfaces (UI) described herein as BC Professional interfaces 59. The cumulative data structures 22, tabulation formats, quantitative and qualitative research, and algorithms 10 that are used in combination to compute risk-related outputs, perform fraud analysis, generate aggregated consumer breach histories 57, analyze, accumulate and report data breach events 70, etc. are referred to herein as a Breach Intelligence Network™. In an illustrative example, the system 100 described herein is referred to as the Breach Clarity™ (BC) system, and includes applications 20 and interfaces 90 directed to consumers and referred to herein as Breach Clarity Freemium, applications 20 and interfaces directed to consumers and referred to herein as Breach Clarity Premium, and applications 20, 45, APIs 24, 43, and user interfaces 59 directed to institutions referred to herein as Breach Clarity Professional.
In a non-limiting example, BC Freemium can be accessed and utilized by a consumer via a user device 30 without registration or identification of the consumer to the BC system 100. In one example, access to BC Premium can be offered by a sponsoring entity, such as a resource provider, to customers of the resource provider, where in an illustrative example, the sponsoring entity interface 25 can be accessed via the BC Premium interface 90, and the BC Premium interface 90 can be accessed by a customer of the sponsoring entity via the sponsoring entity's interface 25. In this example, a breach profile 57, also referred to herein as a My Breach Clarity History profile, can be created for each customer/consumer via a BC Premium interface where the customer/consumer's breach profile 57 includes a history of each breach 70 to which the customer/consumer has been subjected, such that the breach history 57 for that consumer can be analyzed for additional risks attributable to the accumulated breaches to which the consumer has been subjected, and such that mitigation actions 116 customized to the cumulative breach history 57 of that customer/consumer can be identified and/or implemented by the sponsoring entity 50, thus reducing risk to the customer/consumer and to the sponsoring entity as related to the customer/consumer's data held by and/or transactions conducted with the sponsoring entity. In a non-limiting example, the features, interfaces and applications of BC Freemium are included in BC Premium, and BC Freemium and BC Premium can also be referred to individually and/or collectively herein as a consumer user interface 90, a consumer interface 90, a customer interface 90, and/or a subscriber interface 90 to the BC system, which can include a plurality of user interfaces 90A, 90B . . . 90n, configured such that the consumer use can interact with the BC system 100 to access the BC system 100, view and/or enter breach information including breach events 70, view the consumer's risk profile 57, identity roadmap 218, and/or consumer identity score 216, and/or activate mitigation actions 116 to reduce the consumer's identity risk, as further described herein.
In one example, one or more application program interfaces (APIs) 24, 43 are used to interface consumer breach data 22 from the BC system server 12, with customer data 46 from the sponsoring entity server 50, via BC Premium interfacing with BC Professional via a network 130. Using the breach data, customer data, and/or other data inputted by the consumer/customer to the BC system 100, an individualized breach history profile 57 can be generated and maintained in the BC system 100 for the consumer/customer, which can be referred to herein as a consumer breach profile, and/or in an illustrative example can be referred to herein as the consumer's My Breach Clarity History. In one example, the breach history profile 57 for each customer of a sponsoring entity 50 can be provided via the interfaces 90, 59 between BC Premium and BC Professional to the sponsoring entity 50, which can combine the breach history profile 57 for each customer with the sponsoring entity's data for that customer, to generate a risk profile for that customer, where the combination of the consumer's breach history and risk profile can be referred to herein as the consumer's breach profile, and/or in illustrative examples as the consumer's My Breach Clarity History. In one example, the customer breach profile 57 can include information such a listing of each breach event 70 the customer has been victimized by, an identifier of the breached entity such as the entity's name, the information source from which the breach was identified, whether a fraud event was experienced by the customer related to the breach event, to what extent the customer has completed mitigation actions 116 related to each breach event, etc., where mitigation action tracking, in one example, is performed via a consumer identity roadmap 218 as shown in
In one example, the BC system 100 includes an application and/or application interface referred to herein as BreachedID™, which is API enabled via the BC system 100 and an institution's system 50, to analyze account requests received by the institution related to a consumer/customer account. Using the BreachedID application and consumer/customer identifying information, such as the customer's email address, the account related request is analyzed using the BC System 100 and BC Breach Intelligence Network including data structure 22 to determine the risk associated with the account request, for example, to determine whether the account related request is an attempted fraudulent account application by a third party using consumer/customer's identifying information which has been breached. The BreachedID application and/or the institution can, in response to fraudulent account application attempt identified by BreachedID™, identify and/or implement mitigation actions 116 to prevent the fraudulent account application from being approved without sufficient proof that the application is being completed by the legitimate owner of the identity, the value and frequency of transactions from the new account for an initial period after the application is approved, increasing the authentication requirements for future transactions on the customer/consumer's account, etc.
As further described herein and in the accompanying figures, BC Professional is configured for use by an institution, which can also be referred to herein as a resource provider 50, which may be financial organization, commercial entity, health services organization or the like providing services and products to a customer which involve the use of the customer's personal identification information (PII), and/or where the customer can also be a consumer which has been the victim of a breach. In one example, the institution 50 can be a breached entity. In one example, the institution 50 can be an entity which has not been breached, however provides services and products to customers of the institution 50 which have had their (the customer's) personal data breached, such that the breach of the customer's data presents a potential risk to the institution 50, for example, in the form of fraud on the institution, account takeover, etc. BC Professional, as further described herein, can include one or more applications, methods and/or processes which can be used by the institution via the BC Professional interface, also referred to as an institution interface 48 to the BC system 100, in understanding, evaluating and analyzing the impact of multiple data breaches on their customer population, and/or for identifying and/or implementing mitigation actions to reduce risk and/or harm to the customer and/or to the institution due to data breaches which have affected, e.g., victimized, their customer population. BC Professional can include, by way of non-limiting example, a BreachFeed™ application, which is a “news feed” style information compiling and reporting tool that displays to the institution user 50 new breaches reported in real-time, where the breach information associated with the new breaches is aggregated from multiple sources including Breach Clarity Premium, dark web monitoring, common point of purchase (CPP) analysis, etc., where new breach information can be reported separately and/or can be aggregated with known breach information to report and provide breach exposure analysis for a selected period of time, for example, to display information from breaches reported within the last day, week, or month. In one example, breach event information can be analyzed in conjunction with information known by the institution and/or available from the BC system databases, regarding the institution's customer population, to determine and/or estimate the impact of a particular breach or breaches on the institution's customer population, as shown in the figures accompanying this disclosure.
In one example shown in
As previously described and further illustrated herein by the process shown in
The BC system 100 described herein includes, in an illustrative example, an apparatus 12, which may be referred to herein as a BC server or computing device 12, the computing device having a processor 14 and a non-transitory memory 16, the non-transitory memory storing instructions executable by the processor 14 such that the apparatus is configured and/or operable to execute methods and processes including methods and processes 105, 125, 145. 165, 175 and 205, and/or applications described herein which can also be referred to as Breach Clarity™ (BC) processes, including, for example, generating a Breach Clarity Score 80 (BC Score) for an identified breach, executing processes as described herein associated with BreachFeed, breach entity and/or institution 50 searches, customer searches, BreachedID, Build-a-Breach, Fraud Analysis processes, My Breach Clarity History and/or consumer risk profiles 57, consumer identity roadmaps 218 including mitigation actions 116, Consumer Identity Scores 216, etc., and processes as described herein associated with BC Freemium, BC Premium, and BC Professional applications and interfaces. In an illustrative example, and as shown in
Referring to
As used herein, the risk 72 to a consumer as a result of a data breach can also be referred to herein as a harm 72 or as an injury 72, such that the terms risk, harm, and injury are to be broadly construed to include all types of damage to the consumer which can result from a data breach, including but not limited to the harms 72 described herein and shown in the figures. Each of the risk-related outputs can be generated by the BC system 100 for each breach event 70, and/or as a summary output for a plurality of breach events experienced by a consumer-victim. A breach event 70 can also be identified herein by a breach descriptor, e.g., by a name or description by which the breach event 70 is identified. The risk-related outputs can include, in an illustrative example and described in further detail herein, one or more breach descriptors a set of breachable information elements 68, one or more of a set of harm descriptors 72, and an overall data breach score 80 also referred to herein as a Breach Clarity™ (BC) score 80 generated for the particular breach event 70.
As shown in
A consumer, also referred to herein as a consumer-victim, a consumer user, a consumer customer, a subscriber, and/or a customer, can access the BC system 100, for example, via a user device 30 and breach system interfaces such as BC Freemium, BC Premium and/or customer interfaces of BC Professional, to view breach information including risk outputs generated by the BC system 100 for one or more breach events 70. In one example, the consumer accessing the BC system 100 can be a consumer-victim of a breach event 70 accessing the BC system 100 to view information outputted by the BC system 100 related to that breach event 70. In another example, the consumer is not required to be a victim of a breach 70, e.g., any consumer can access the BC system 100 to view breach information, including the risk outputs 72 generated by the BC system 100 for one or more breach events 70. In one example, the BC system 100 can be configured such that a consumer is not required to input identifying information, and/or to identify themselves as a victim of a breach event 70 as a prerequisite to accessing the BC system 100. In another example, the BC system 100 is configured to provide an option to a consumer to subscribe to the BC system 100, such that subscription information for the subscriber-consumer can be stored in the memory 16 of the BC server 12 in the data structure 22, for example, in a consumer profile created in the data structure 22 for the subscriber-consumer. The term “subscription” is intended to have a broad meaning including, for example, one or more actions such as creating an account, creating a log-in name and password, enrolling and/or registering as a user of the BC system 100 and/or to receive notifications from the BC system 100, creating a consumer profile, etc. The term “subscription” can include, but is not limited to, a subscription whereby the subscriber is assessed a fee for accessing the BC system 100. In one example a consumer can subscribe without payment of a subscription fee. In another example, the BC system 100 and/or a subscription to the BC system 100 can be offered to consumer by a sponsoring entity 23, where the sponsoring entity 23 may be a resource provider 50 which may be a financial organization, commercial entity, or health services organization offering and/or providing products and/or services to the sponsored consumer.
In one example, the sponsored consumer can be a customer of the sponsoring entity 23 such that the sponsored consumer may be referred to herein as a customer, a consumer/customer, a subscribed customer, or the like. In one example, the sponsoring and/or other entity can host a portal 29 to the BC system 100 on the sponsor/other entity's website, through which a consumer can access the BC system 100. The sponsoring entity can also be referred to herein as a sponsoring institution 23 and/or as a resource institution 50. In an illustrative example, the sponsoring institution 23 is a resource provider 50 operating as a financial services provider such as a bank, offering to its customers a sponsored subscription to BC Premium which can be accessed through an institution interface 25 of the institution 23. In an illustrative example, the institution 23 utilizes the Breach Clarity application 20 referred to herein as BC Professional, such that the institution 23 communicates with the BC server 12 through one or more BC APIs 24 and institution APIs 43. In one example, the customer identifying information for one or more customers of the institution's customer population is associated via the APIs 24, 43 with breach information in the Breach Intelligence Network and/or data structure 22 of the BC server 12, such that customer specific breach history profiles 57 and/or customer specific risk evaluation and mitigation outputs such as Consumer Identity Roadmaps 218 can be generated by the BC system 100 and provided to the institution 23 and the institution's consumer customer via the BC Professional application 20.
In a non-limiting example, the subscriber-consumer's subscription information and/or the subscriber-consumer's consumer profile 57 is associated in the data structure 22 at least with each breach event 70 in which the subscriber-consumer has been a known victim, and with each of the subscriber-consumer's information elements 68 which has been breached or compromised. The consumer profile 57 can also be referred to herein as a consumer risk profile and/or as a subscriber risk profile, as a consumer breach profile, and in a non-limiting example, an individual consumer profile can be referred to herein as My Breach Clarity History. During the subscription process, the subscriber-consumer may input to the BC system 100 information elements 68 of the subscriber-consumer which have compromised and/or breached which are not associated with a publicly reported breach, for example, theft of credit card information from a stolen purse or wallet, loss of payment information by skimming, improper disposal of personal information records, etc. In a non-limiting example, the subscription information for a subscriber-consumer can include identifying information for identifying the subscriber-consumer including for example, the subscriber-consumer's name, address, e-mail address, phone, other social media contact information (Twitter®, Instagram®, etc.), a listing of the breach events 70 in which the subscriber-consumer has been victimized including the number, type, frequency and timing of each of these breach events 70, a listing of the subscriber-consumer's information elements 68 which have been breached or compromised by the breach events 70 in which the subscriber-consumer has been victimized, actual harm or injury incurred by the subscriber-consumer due to a data breach or compromise, behavioral and/or demographic-based information for the subscriber-consumer which, in one example, can be used by the BC system 100 and/or the algorithms 10 to generate, rank, weight, and/or otherwise prioritize mitigation actions 116 which can outputted to the subscriber-consumer. In this latter example, behavioral information can include, by way of non-limiting example, the subscriber-consumer's information security behaviors including for example, password behaviors including reuse of passwords, frequency of changing passwords, password security messages used by the subscriber-consumer, the subscriber-consumer's use of anti-virus, security, anti-malware products, the subscriber-consumer's use of identity theft tools such as credit score monitoring, the subscriber-consumer's frequency and breadth of on-line communication methods (private and public networks including Wi-Fi, e-mail, chat rooms, blogs, social media, instant messaging, etc.), the subscriber-consumer's frequency and breadth of on-line use and/or communication of PII personally identifiable information (PII), protected health information (PHI), payment card industry (PCI) data, including on-line accessing and manipulation of this information, the subscriber-consumer's data access mechanisms including the type, model, etc. of devices (mobile phones, personal computers, personal digital assistants, tablets, lap tops, modems, routers, smart appliances, smart home devices and systems, smart vehicles, etc.) used by the subscriber-consumer, etc. In this latter example, demographic information can include, by way of non-limiting example, the subscriber-consumer's geographic location, income demographic, age, gender, marital status, occupation, etc. One or more algorithms of the BC system 100 can be configured to incorporate the subscriber-consumer's subscription information in generating one or more of the risk outputs, for example, in generating an exposure rating 132, a listing of recommended mitigation actions 116, a rank ordering of harms 72, etc., where the subscription information can be used by the algorithm as a modifier and/or additional factor in the calculation and/or generation of the risk outputs by the BC server 12. The example of using subscriber information in the calculation and/or generation of the risk outputs is illustrative and non-limiting. For example, one or more algorithms of the BC system 100 can be configured to associate, in the data structure 22, a non-subscribing consumer's identifying information, with one or more of the breach events 70, breached information elements 68, etc., in generating one or more of the risk outputs, for example, in generating an exposure rating 132, a listing of recommended mitigation actions 116, a rank ordering of harms 72, etc., where the consumer information can be used by the algorithm as a modifier and/or additional factor in the calculation and/or generation of the risk outputs by the BC server 12.
In one example, the consumer breach profile, e.g., the consumer's My Breach Clarity History profile, can be matched to identifying customer information provided by an institution 23 to the BC system 100 via the BC Professional application, such that a customer risk profile can be compiled by the BC system 100 and/or by the institution 23 for the institution's customer/consumer. In one example, customer risk profile can be combined with customer risk profiles of other customers of the institution 23, and the BC Professional application can be used to analyze, evaluate, and generate a breach risk assessment for the institution based on the number and type of breaches impacting the customer population of the institution 23.
Referring again to
The system 100 can include one or more reporting servers 40 configured and/or operable to report information related to a data breach, which can include, for example, a breach descriptor 70 of the breached entity, such as a company name (for example, “Equifax” or “Anthem”), breach event information including date(s) breached, information elements 68 breached and/or compromised by the breach (personally identifiable information (PII), protected health information (PHI), payment card industry (PCI) data, etc.), information relating to the breaching entity (hacker, criminal, etc.), post-breach exposure and/or use of the breached data (availability for sale in online criminal marketplaces), etc. Each of the reporting servers 40 is administered and/or operated by a reporting entity which is reporting a breach event. The reporting entity administering a reporting server 40 can be, by way of example, a breached entity reporting information related to a breach of its own data, a regulatory or government organization configured to receive information from breached entities and/or to report the information to consumer-victims, a financial institution, a government organization, a health organization, a retail entity, etc. reporting breaches of its respective data, etc. In one example, the reporting entity is an organization such as the Identity Theft Resource Center (ITRC) which maintains a database 36 of breach information. The BC system 100 collects breach event information, for example, via communication between the BC server 12 and one or more of the reporting servers 40, for use in generating the BC risk-related outputs described herein. In an illustrative example, the reporting server 40 includes a memory 32 and a central processing unit (CPU) 34. The memory 32 of the reporting server 40 can include, by way of example, Read Only Memory (ROM), Random Access Memory (RAM), electrically-erasable programmable read only memory (EEPROM), etc., i.e., non-transient/tangible machine memory of a size and speed sufficient for storing breach event information collected by the reporting entity related to a breach event 70 in a reporting database 36. The memory 32 is of a size and speed sufficient for the manipulation and reporting out of the breach event information by the reporting entity administrating the reporting server 40. In an illustrative example, the BC server 12 receives breach information regarding a breach event 70 at the time the breach is initially reported, and can continue to receive information periodically thereafter regarding the breach event 70, such that the breach information related to the breach event 70 can be periodically updated in the data structure 22 as additional breach information is learned and/or becomes available. The BC server 12 can continue to monitor and/or receive breach information periodically after occurrence of each particular breach event 70, related to the observed availability of the breached data (for that particular breach event 70) in unauthorized sites, e.g., in unauthorized circulation. In one example, the BC server 12 receives breach information as to the observed availability of the breached data on “dark” web sites, on the darknet, also referred to herein as the dark web 202, or other through other sources including non-network locations, including, for example, the availability of the breached data for sale or other distribution for unauthorized uses. The BC server 12 and/or algorithms in response to the breach information as to the observed availability of the breached data, can, for example, modify the exposure rating 132, re-rank mitigation actions 116, and/or modify the likelihood of harm, e.g., the risk distribution 134 of the risks associated with that particular breach event 70.
The reporting server 40 includes a reporting interface 38, which in an illustrative example can be configured as a modem, browser, or similar means suitable for accessing a network 130. In one example, the BC server 12 collects breach event information from the one or more reporting servers 40 via the network 130 and stores the collected breach event information within the BC memory 16 and/or data structure 22 for use in generating the BC risk-related outputs using BC algorithms 10 and/or applications 20. The BC Breach Intelligence Network including the BC data structure 22 can include one or more data-mapping tables, functions, and/or BC applications 20 for mediating the importation of data from a reporting server 40 and/or reporting database 36, include BC applications 20 for mapping data fields from a particular reporting database 40 to the corresponding fields in the BC data structure 22. The BC Breach Intelligence Network and/or the BC data structure 22 can include a plurality of data-mapping applications, where each application can be configured for a specific reporting database 36, to improve the efficiency and effectiveness of data importation and consolidation into the BC data structure 22 from multiple reporting databases 36 administrated by multiple reporting entities. For example, the BC data structure 22 can include a first data mapping application for mediating the importation of data from a first reporting database 36 administrated by a government regulatory agency receiving reports of data breach events 70 from various types of organizations (banks, brokerages, etc.) in the financial industry, a second data mapping application for mediating the importation of data from a retail entity which has experience a data breach event 70, a third data mapping application for mediating the importation of breached data reported by an individual consumer, a fourth data mapping application for mediating the importation of breached data reported by a medical institution, and so on. As such, the BC data structure 22 and the BC methods for generating risk outputs provides a standardized database of breach information and an efficient and standardized approach to quantifying the risks and harms 72 to a consumer-victim associated with a data breach event 70, for that breach event 70 and relative to other breach events 70.
The system 100 can include one or more resource servers 50 configured to provide resources, including mitigation actions 116 (see
In another illustrative example, the resource server 50 can incorporate a third-party source of breach status information or other details, such as IDtheftcenter.org, a credit reporting agency, an activity monitoring system for monitoring online activity related to a consumer's online accounts, email addresses, etc. such as the website www.haveIbeenpwned.com, a breached entity's own site established to for a consumer to obtain breach information from that breached entity such as the website https://trustedidpremier.com/eligibility/eligibility.html established for victims of the Equifax breach event. In this example, the resource server 50 can be integrated with the BC server 12, via an API or like system, such that the resource server 50 can automatically provide breach information to the BC server 12. In one example, the BC system 100 is operable and/or configured such that, when breach information related to a consumer-specific account is received by the BC server 12 from an integrated resource server 50, the BC server 12 updates the consumer's BC risk profile, including recommended mitigation actions 116, exposure ratings 132, and the like, and automatically provides notifications to the affected consumer.
In the example shown in
The example shown in
Referring to
At 109 and 111, the enrolled consumer can be requested, via a BC Premium interface 90, to provide account information related to one or more electronic transaction accounts associated with the enrolled consumer, and/or to provide access by the BC system 100 to one or more electronic transaction account associated with the consumer, for example, by providing account access credentials and/or executing or installing a plug-in or widget to allow retrieval of electronic transaction data by the BC server 12 from the transaction account. In an illustrative example, the electronic transaction account is configured to execute a consumer transaction between the consumer and a party to the consumer transaction. Electronic transaction information associated with the consumer transaction is generated via the electronic transaction account, and retrieved via the network 130, where in an illustrative example, the electronic transaction information includes a consumer identifier corresponding to the consumer, a party identifier corresponding to the party, and a transaction time corresponding to the time the consumer transaction was executed via the electronic transaction account.
In one example, the consumer profile information includes account credentials corresponding to the electronic transaction account, and the method includes accessing the electronic transaction account using the account credentials. The account credentials can include one or more of an account identifier such as an account number or account name, an account password, an account authentication code, etc. as required for the breach system 100 and/or the BC server 12 to access the electronic transaction account and/or retrieve electronic transaction information from the electronic transaction account. In one example, accessing the electronic transaction account includes receiving, via the network, a plug-in for accessing the electronic transaction account and executing the plug-in to transmit the transaction account information via the network such that the electronic transaction information is retrieved from the account via the account plug-in.
In an illustrative example, the electronic transaction account is an electronic mail (email) account, the consumer transaction is an email transaction between an email sender and an email recipient, and the party to the consumer transaction is one of the email sender and the email recipient and comparing the electronic transaction information with the breach information includes determining a match between the breach information of the respective data breach and at least one of the email sender or the email recipient. In one example, the consumer identifier is an email address associated with the consumer. The email account can be provided to the consumer and serviced by an email hosting service provider, which may also be referred to herein as an email hosting provider, a webmail provider, or as an email provider, and for example, via an email server 87 administered and/or operated by the email provider. Non-limiting examples of email service providers include Gmail, Outlook, Yahoo!, AOL Mail, and the like, and can further include non-public email service providers. As shown in
Referring to
In use, the email plug-in provides, for email transactions occurring via the consumer's email account, for example, for each email sent from or received from the account, the name and/or email address of the email recipient, the name and/or email addressed of the email sender, and the date the email was received or sent. Additional transaction information, such as the time of day the email was received or sent, could also be retrieved. In the event the consumer has more than one email account, the process of enrolling the consumer's email account for retrieval of email transaction information from the email account can be repeated for each of the consumer's email accounts.
Once enrolled, the BC server 12 either continuously or at predetermined intervals, for example, hourly, daily, weekly, retrieves the email transaction information from the consumer's enrolled email account(s) and compares the email transaction information to a database of publicly reported breach events 70 and/or to other data breach information collected into the Breach Intelligence Network and/or data structure 22, to match the email transaction with breach information of a breach event 70, for example, by matching the names of senders and/or recipients with the name of a breached organization, and the dates of emails with date ranges know to be associated with compromised data in each breach event 70. Where a match is determined, the matching breach event 70 is then processed through the BC algorithm and assigned a BC score 80, and the consumer's My Breach Clarity History profile is appended with the matching breach event information at step 121. At 123, a notification can be generated and transmitted to the consumer, to advise of changes and updates to the consumer's My Breach Clarity History, including reminders to complete mitigation actions 116 associated with the matching breach event 70.
In an illustrative example, the electronic transaction account is an electronic payment account, the consumer transaction is an electronic payment transaction between a payor and a payee, and the party to the consumer transaction is one of the payor and the payee such that comparing the electronic transaction information with the breach information includes determining a match between the breach information of the respective data breach and at least one of the payor and the payee. In one example, the consumer identifier is a payment account number associated with the consumer, which can be a payment card number.
The payment account can be provided to the consumer and administered by a payment service provider, which may also be referred to herein as a payment processor, and which can be, for example, an issuing bank from which the consumer's payment card (Mastercard, Visa, etc.) has been issued, a third party payment online provider/processor such as PayPal, Square, etc., via a payment server 89 administered and/or operated by the payment service provider. As shown in
Referring to
In use, the BC server 12 retrieves and/or receives payment transaction information from the consumer's payment account, including transactions where the consumer payor has rendered payments, and analyzes users' payment histories to identify organizations where a payment was rendered at a period of time, comparing the names of those organizations with those associated with a breach event 70 in the data structure 22 and/or in the Breach Intelligence Network, and comparing the dates of those payments with when those organizations were known to have experienced a data breach event 70, to identify if the consumer was also using a payment account provided by the organization during the time of occurrence of the identified breach event 70.
In the event the consumer has more than one payment account, the process of enrolling the consumer's payment account for retrieval of payment transaction information from the payment account can be repeated for each of the consumer's payment accounts. As described for step 209, at step 111, once enrolled, the BC server 12 either continuously or at predetermined intervals, for example, hourly, daily, weekly, retrieves the payment transaction information from the consumer's enrolled payment account(s) and compares the payment transaction information to a database of publicly reported breach events 70 and/or to other data breach information collected into the Breach Intelligence Network and/or data structure 22, to match the payment transaction with breach information of a breach event 70, for example, by matching the names of payees with the name of a breached organization, and the dates of payment transactions with date ranges know to be associated with compromised data in each breach event 70. Where a match is determined, the matching breach event 70 is then processed through the BC algorithm and assigned a BC score 80, and the consumer's My Breach Clarity History profile is appended with the matching breach event information at step 121. One or more mitigation actions related to the breach event 70 may be identified for completion by the consumer related to the consumer's payment account, including, for example, changing an account password, changing an account number, implementing transaction limits and/or alerts, etc. In one example, where the payment provider 89 is also the subscriber institution through which the consumer has accessed BC Premium, the mitigation actions suggested to the consumer may be communicated to the consumer via the subscriber institution's website and/or through the BC Premium link accessible via the subscriber institution's website, for convenient access by the consumer and to encourage timely completion of the mitigation action 116 by the consumer. At 123, a notification can be generated and transmitted to the consumer, to advise of changes and updates to the consumer's My Breach Clarity History, including reminders to complete mitigation actions 116 associated with the matching breach event 70.
At 113, the enrolled consumer accesses the BC Premium interfaces 90 to, for example, search for breach information related to one or more breach events 70 of interest to the consumer, and/or by which the consumer has been victimized. At 115, a My Breach Clarity History profile 57 can be generated for the enrolled consumer, listing the breach events 70 associated with the consumer in the Breach Intelligence Network and/or the BC data structure 22. In one example, the consumer at 115 can enter breach information via a BC Premium interface 90, to be added to the consumer's My Breach Clarity History as a consumer reported breach event.
At 117, additional breach related information, including for example, a rank ordered listing of mitigation actions 116 which are recommended to the consumer based on the consumer's breach profile 57, can be displayed to the consumer. In one example <<describe Consumer Identity Roadmap 218>> can be generated at 117. In one example, the mitigation actions 116 may be linked via an interface element 118, URL, etc., to a resource provider 50, to facilitate consumer adoption and/or execution of the recommended mitigation actions 116. In the example of a sponsored enrollment, one or more of the mitigation actions 116 can be linked via an institution link 31 to the sponsoring institution 23, for activation of the mitigation action 116 via the sponsoring institution 23, as shown in a non-limiting example in
The breach information interface 90T further includes a listing of recommended mitigation actions 116, which can also be rank ordered according to rated effectiveness in mitigation harm from the selected breach event 70B. One or more of the mitigation actions 116 can be associated or linked to a user interface element 118 which when selected directs the user to a resource interface for actioning the recommended mitigation action 116. Referring again to
In the examples shown in
Further, by conveniently providing access to the BC Premium interface 90 within the consumer/customer's institution interface 25, the consumer/customer can expeditiously search for other breach events which have impacted the consumer/customer, and add these to the consumer/customer's breach history profile 57. In the example shown in
Referring now to
The method 125 at 129 and referring to
After being authenticated to the BC Professional platform, the BC Professional platform, in the example illustrated in
The method 125 at 133 can include the institution user conducting a breach search to generate an exemplary breach search report shown in a BC Professional interface 59C displayed in
Referring to
In a non-limiting example, the customer search report generated at 135 using the BC Professional customer search application illustrated in
In one example, at 155, the BreachedID application generates a risk evaluation assessment which indicates the risk that the account related request is fraudulent and/or an account takeover request is low or minimal, based for example, on a determination that the identifying information element provided by the requestor has not been shown as compromised by any of the breach events associated with the customer/account owner in the Breach Intelligence Network, such that at 157, the institution upon receipt of the BreachedID risk assessment determines the request is likely a bona fide request and at 159 actions the request on the customer's account.
In another example, at 155, the BreachedID application generates a risk evaluation assessment which indicates the risk that the account related request is fraudulent and/or an account takeover request is high, based for example, on a determination that the identifying information element provided by the requestor has been shown as compromised by one or more breach events associated with the customer/account owner in the Breach Intelligence Network, and has been utilized in performing one or more fraudulent actions causing harm to the customer, such that at 157, the institution upon receipt of the BreachedID risk assessment determines the request is likely a fraudulent or account takeover request and at 159 refuses the request. In this case, at 159 the institution may additional initiate investigative actions to determine the source of the fraudulent request and/or refer the fraudulent request to the appropriate investigation and/or enforcement authorities.
In another example, at 155, the BreachedID application generates a risk evaluation assessment which indicates the risk that the account related request is fraudulent and/or an account takeover request is moderate, based for example, on a determination that the identifying information element provided by the requestor has been shown as compromised by at least one breach event associated with the customer/account owner in the Breach Intelligence Network, however has not been associated with the performance of a fraudulent actions causing harm to the customer, such that at 157, the institution upon receipt of the BreachedID moderate risk assessment determines the request may be a bona fide request and at 159 initiates additional actions to authenticate the request as a bona fide account related request. The additional actions initiated by the institution at 159 could include, for example, contacting the account owner directly to request confirmation of the request, requiring additional authenticating information from the requestor, etc. The BreachedID application, when utilized by the institution via the BC Professional platform, advantageously provides data-enabled scrutiny of an account related request, prior to implementation of the request, to prevent and/or reduce the occurrence of account takeover of or other fraud on a customer's account.
Referring to again to
In one example, the “Institution Built” breach event 70 built by the institution using the Build-a-Breach application of the BC Professional platform can be stored at step 173 to the Breach Intelligence Network and/or the data structure 22 of the BC system 100, such that other institutions accessing the Breach Intelligence Network via the BC Professional platform can access the “Institution Built” breach event. Likewise, breach events build by other institutions using the Build-a-Breach application can save those breach events to the Breach Intelligence Network such that all institutions accessing the BC Breach Intelligence Network via the BC Professional platform can utilize the build breach events in assessing, managing and mitigating risks and harms to their respective customer populations. In one example, the BC Professional platform and/or the BC Breach Intelligence Network can include a reporting capability whereby an alert can be generated and sent to each institution having access to the Breach Intelligence Network via BC Professional, to notify them when a breach event generated using the Build-a-Breach application has been reported to the Breach Intelligence Network.
In another example, still referring to
Referring again to
At 179, the incoming breach information is normalized for storage in the data structure 22, including, for example, inputting to the data structure 22 a breach identifier (breach name) 70 for the breach event defined by the incoming breach information, inputting to the data structure 22 one or more information elements which have been breached and associating these in the data structure 22 with the breach identifier 70, and inputting to the data structure 22 and associating with the breach identifier 70 in the data structure 22 additional elements of the incoming breach information including, for example, dates of occurrence, consumer identifying information associated with the breached information, the breach type, method of compromise, harms associated with the breach event including, for example, incidents of unauthorized use, distribution and/or sale of the breached information, etc.
At 181, for the breach event 70, the BC server 12 applies one or more algorithms 10 to associate particular risks and harms 72 with each of the breached information elements 68, and stores each information element-harm pair in the data structure 22, associating the pair with the breach event 70. The BC further applies one or more algorithms 10 to compute an element risk 74 for each information element-harm pair and stores the element risk 74 in the data structure 22, as illustrated in the non-limiting example shown in
At 183, the BC server 12 applies one or more algorithms 10 to the accumulated element risks 74 identified for each information element-harm pair to generate, for each type of harm 72, a harm risk 76, and to generate, for the breach event 70, using the accumulated harm risks 76 for all harm types associated with the particular breach event 70, an overall BC score 80, where the BC score 80 is normalized to provide a relative indicator of the consumer risk associated with the breach event 70.
At 185, the BC server 12 uses the harm risks 76 to rank order the harms 72 associated with the breach event 70, and identifies mitigation actions 116 for the identified harms 72.
At 187, the BC server 12 applies one or more algorithms 10 to the identified mitigation actions 116 and harms 72 associated with the breach event 70, and using other breach information, rank orders the mitigation actions 116 to identify those mitigation actions 116 likely to prevent the greatest harm, for notification to consumers affected by the breach event 70.
At 189, the BC server 12 associates the breach event 70 in the data structure 22 with consumer breach profiles 57 (My Breach Clarity History profiles) of those consumers determined by the BC server 12 to be affected by the breach event 70. In one example, an identity roadmap 218 for the consumer is generated and/or updated to include the prioritized mitigation actions 116 for the subject breach event 70. Example mitigation actions 116, including prevention and detection actions 116 which may be implemented through the BC System 100 described herein, are shown in
The method 175 further includes, at 191, notifying each consumer user affected by the breach event 70 of the breach event via, for example, a BC Premium interface 90 or a sponsoring institution interface 25, where the consumer user can be a customer of the sponsoring institution 50.
At 193, and referring to the examples shown in
The method 175 further includes, at 195, notifying each consumer subscriber of the mitigation actions 116 pending for completion in the consumer's identity roadmap 218, by an electronic message transmitted to the consumer, for example, as an email message, SMS, text message, or notification displayed in at least one of the BC interface 90 and/or the institution interface 25.
At 197, in response to completion of a mediation action 116 by the consumer, the BC system 100 updates the consumer's identity roadmap 218 including the listing of mediation actions 116, to either indicate completion of the mediation action 116 or to remove the mediation action 116 from the listing 218 of mediation actions 116.
At 199, the process returns to step 177, either in response to receipt of additional breach information, on a continuing basis, and/or at a predetermined interval, for example, hourly, daily, weekly, etc.
Referring now to
Referring to
At 220, the deprecated breach information provided from 215 is combined with and/or modified by breach intelligence information 206, which can include, for example, information related to the type of breach, the age of the breach, criminal activity associated with a breach event and/or consumer's breached information elements, including, for example, the recent appearance of the consumer's breached credentials on a dark website, reported fraud on the consumer's accounts, etc., to supplement and/or modify the consumer's breach information forward to step 225.
At step 225, an algorithm 222 is applied to the breach information received from step 220 to manipulate the breach information using factors derived substantially in part from the consumer's breach history profile 57, including, in a non-limiting illustrative example, manipulating an information element risk vector 208 derived from the consumer's aggregated breached information elements 68, and a harm risk vector 214 derived from the aggregated harms 72 associated with the aggregated breached information elements 68, each of these vectors 208, 214, in a non-limiting example, modified by and/or including a frequency of breach of each information element 68 and/or a frequency of harm exposure to each harm 72, and/or further modified for cumulative effect of combinations of breached information elements 68 and or harms 72, where the vectors 208, 214 are further manipulated by application of mitigation action data 212, where the mitigation action data 212 is derived from the completion status of mitigation actions 116 recommended to the consumer, the relative ranking of the completed and uncompleted mitigation actions 116 in impact on risk reduction, and the cumulative effects (interactions) of combinations of mitigation actions 116 to affect the risk exposure from one or more of the harms 72 associated with the consumer's breach history profile 57.
At 230, a scoring logic algorithm is applied to the output received from step 225, to generate a raw risk score 226. At 235, a normalizing algorithm 228 is applied to the raw risk score 226, to normalize the raw risk score 226 to a index or scale, for example, to normalize the raw risk score 226 to saturate to a scale of 100, to output a normalized risk score 216. The normalized risk score 216 is also referred to herein as the Consumer Identity Score 216. At step 240, the Consumer Identity Score 216 can be reported to the consumer, for example, via an electronic message or via one or more consumer BC interfaces 90, 25.
The process 205 returns to step 210, where the Consumer Identity Score 216 is regenerated, for example, when a change in the consumer's breach history profile is detected, when the consumer completes a mitigation action 116, at the consumer's request, or on a predetermined frequency, for example, daily, weekly, or monthly. In one example, the consumer's Consumer Identity Score 216 can be displayed over time via the consumer BC 90, 25 to provide a visual indicator of the trend (improving, deteriorating, constant) in the Consumer Identity Score 216, as a visual reminder to the consumer to complete mitigation actions 116, and/or to visually alert the consumer to changes in their identity risk exposure.
The detailed description and the drawings or figures are supportive and descriptive of the disclosure, but the scope of the disclosure is defined solely by the claims. While some of the best modes and other embodiments for carrying out the claimed disclosure have been described in detail, various alternative designs and embodiments exist for practicing the disclosure defined in the appended claims. Furthermore, the embodiments shown in the drawings or the characteristics of various embodiments mentioned in the present description are not necessarily to be understood as embodiments independent of each other. Rather, it is possible that each of the characteristics described in one of the examples of an embodiment can be combined with one or a plurality of other desired characteristics from other embodiments, resulting in other embodiments not described in words or by reference to the drawings. Accordingly, such other embodiments fall within the framework of the scope of the appended claims.
Claims
1. A method for apprising a consumer of an accumulated risk resulting from data breaches, comprising:
- receiving enrollment information for the consumer;
- generating a consumer profile breach history for the consumer based on the enrollment information;
- accessing an electronic transaction account associated with the consumer, the electronic transaction account configured to execute a consumer transaction between the consumer and a party to the consumer transaction;
- generating electronic transaction information for the consumer transaction;
- accessing breach information for a plurality of data breaches;
- comparing the electronic transaction information with the breach information to determine one or more breach events, the breach events representing a matching of the electronic transaction information with the breach information of a corresponding one of the data breaches;
- appending the consumer profile breach history with a breach listing, the breach listing identifying each of the breach events; and
- appending the consumer profile breach history with an accumulated harm risk score, the accumulated harm risk score providing a relative indicator of risk accumulated for the consumer as cumulative result of the breach events.
2. The method according to claim 1, further comprising:
- displaying the consumer profile breach history with the breach listing and the accumulated harm risk score via a consumer user interface operable on a computing device.
3. The method according to claim 2, further comprising:
- appending the consumer profile breach history to display one or more mitigation actions relative to one or more of the breach events, the mitigation actions detailing options available to the consumer for reducing risk and/or harm resulting from one or more of the breach events.
4. The method according to claim 3, further comprising:
- appending the consumer profile breach history to display one or more selectable links for the mitigation actions, the selectable links being selectable via the consumer user interface to direct the consumer to a resource interface for actioning a corresponding one of the mitigation actions.
5. The method according to claim 4, further comprising:
- prioritizing display of the mitigation actions to identify a relatively strongest one of mitigation actions, with each remaining mitigation actions ordered thereafter according to a level strength.
6. The method according to claim 4, further comprising:
- appending the consumer profile breach history to display one or more potential harms relative to one or more of the breach events, the potential harms detailing likely or probable impact, injury, or damage to the consumer from one or more of the breach events.
7. The method according to claim 6, further comprising:
- appending the consumer profile breach history to display an element risk score for each of the potential harms, the element risk scores providing a relative indicator of risk to the consumer for the corresponding one of the potential harms.
8. The method according to claim 1, further comprising:
- generating a breach notification to apprise the consumer of appending the consumer profile breach history with the breach events.
9. The method of claim 1, further comprising:
- accessing the electronic transaction account via a network using an account plug-in for the electronic transaction account.
10. A computer-readable storage medium storing a plurality of non-transitory instructions, which when executed with one or more processors of a computing system, are operable for:
- identifying a consumer profile breach history for a consumer;
- retrieving electronic transaction information for the consumer;
- retrieving breach information for a plurality of data breaches;
- comparing the electronic transaction information with the breach information to determine one or more breach events, the breach events representing a matching of the electronic transaction information with the breach information of a corresponding one of the data breaches; and
- appending the consumer profile breach history with an accumulated harm risk score, the accumulated harm risk score providing a relative indicator of risk accumulated for the consumer as cumulative result of the breach events.
11. The computer-readable storage medium according to claim 10, wherein the non-transitory instructions are operable for:
- accessing an electronic transaction account associated with the consumer to via a network using an account plug-in for the electronic transaction account; and
- retrieving the electronic transaction information from the electronic transaction account.
12. The computer-readable storage medium according to claim 10, wherein the non-transitory instructions are operable for:
- generating a consumer user interface to display the consumer profile breach history via a computing device associated with the consumer.
13. The computer-readable storage medium according to claim 12, wherein the non-transitory instructions are operable for:
- electronically transmitting a breach notification to the consumer, the breach notification including a selectable link for directing the computing device to the consumer user interface.
14. The computer-readable storage medium according to claim 12, wherein the non-transitory instructions are operable for:
- displaying within the consumer user interface a breach listing identifying each of the breach events.
15. The computer-readable storage medium according to claim 14, wherein the non-transitory instructions are operable for:
- displaying within the consumer user interface one or more potential harms for one or more of the breach events, the potential harms detailing likely or probable impact, injury, or damage to the consumer from one or more of the breach events.
16. The computer-readable storage medium according to claim 15, wherein the non-transitory instructions are operable for:
- displaying within the consumer user interface an element risk score for one or more of the potential harms, the element risk scores providing a relative indicator of risk to the consumer for the corresponding one of the potential harms.
17. The computer-readable storage medium according to claim 16, wherein the non-transitory instructions are operable for:
- displaying within the consumer user interface one or more mitigation actions for one or more of the breach events, the mitigation actions detailing options available to the consumer for reducing risk associated with one or more of the potential harms.
18. A computer-readable storage medium storing a plurality of non-transitory instructions, which when executed with one or more processors of a computing system, are operable for:
- determining one or more breach events for a consumer;
- generating an accumulated harm risk score for the consumer, the accumulated harm risk score providing a relative indicator of overall risk accumulated for the consumer as result of the breach events;
- identifying one or more potential harms for one or more of the breach events, the potential harms indicating a likely or probable impact, injury, or damage to the consumer from one or more of the breach events; and
- identifying one or more mitigation actions for one or more of the breach events, the mitigation actions detailing options available to the consumer for reducing risk associated with one or more of the potential harms.
19. The computer-readable storage medium according to claim 18, wherein the non-transitory instructions are operable for:
- generating consumer user interface to display a consumer profile breach history via a computing device associated with the consumer, the consumer profile breach history displaying the accumulated harm risk score, the potential harms, and the mitigation actions.
20. The computer-readable storage medium according to claim 19, wherein the non-transitory instructions are operable for:
- displaying within the consumer user interface an element risk score for one or more of the potential harms, the element risk scores providing a relative indicator of risk for the consumer as a result of the corresponding one of the potential harms.
Type: Application
Filed: Sep 25, 2023
Publication Date: Jan 11, 2024
Applicant: Sontiq, Inc. (Nottingham, MD)
Inventors: James Van Dyke (Pleasanton, CA), Alphonse Pascual (Benicia, CA)
Application Number: 18/473,760