17949636. COMPUTER-BASED SYSTEMS CONFIGURED FOR CONTEXTUAL NOTIFICATION OF MONITORED DARK WEB INTELLIGENCE AND METHODS OF USE THEREOF simplified abstract (Capital One Services, LLC)

From WikiPatents
Jump to navigation Jump to search

COMPUTER-BASED SYSTEMS CONFIGURED FOR CONTEXTUAL NOTIFICATION OF MONITORED DARK WEB INTELLIGENCE AND METHODS OF USE THEREOF

Organization Name

Capital One Services, LLC

Inventor(s)

Asher Smith-rose of Midlothian VA (US)

Tyler Maiman of Melville NY (US)

Joshua Edwards of Philadelphia PA (US)

Lin Ni Lisa Cheng of Great Neck NY (US)

Shabnam Kousha of Washington DC (US)

COMPUTER-BASED SYSTEMS CONFIGURED FOR CONTEXTUAL NOTIFICATION OF MONITORED DARK WEB INTELLIGENCE AND METHODS OF USE THEREOF - A simplified explanation of the abstract

This abstract first appeared for US patent application 17949636 titled 'COMPUTER-BASED SYSTEMS CONFIGURED FOR CONTEXTUAL NOTIFICATION OF MONITORED DARK WEB INTELLIGENCE AND METHODS OF USE THEREOF

Simplified Explanation

The present disclosure describes a method, system, and computing device for detecting compromised user information on the dark web, analyzing communication interactions, and displaying alerts to the user.

  • Receiving indication of compromised user information on dark web resources
  • Classifying compromised information into categories
  • Receiving permission to monitor communications
  • Analyzing communications and user interactions
  • Determining spam communications
  • Matching communication content to compromised information categories
  • Displaying alerts to the user

Potential Applications

This technology could be applied in cybersecurity, data protection, and threat detection systems.

Problems Solved

This technology helps in identifying compromised user information and potential threats in communications.

Benefits

The system provides real-time alerts to users, enhancing their awareness of potential security risks.

Potential Commercial Applications

Potential commercial applications include cybersecurity software, data protection services, and threat detection solutions.

Possible Prior Art

One possible prior art could be existing cybersecurity systems that monitor and analyze user communications for potential threats.

Unanswered Questions

1. How does the system ensure user privacy while monitoring communications? 2. What measures are in place to prevent false alerts or misinterpretations of communication content?


Original Abstract Submitted

The present disclosure provides an exemplary method, system, and computing device that may include the steps of receiving a first indication that information of a user has been detected at one or more dark web resources; classifying the item of the compromised information into an information type category; receiving a permission indicator to detect communications by the computing device; receiving a second indication of a communication; receiving a third indication that the user engages an interaction with the communication; instructing the computing device to execute a technique to obtain data for the communication; receiving the data for the communication; determining the communication is a spam communication; determining a current information type category being discussed during the spam communication; making a determination that the current information type category corresponds to the information type category; and instructing a graphical user interface to display an alert to the user.