1
Harold E Gottschalk Jr, Michael Caldwell, Joel Carleton: System and methods for identifying compromised personally identifiable information on the internet. CSIdentity Corporation, Knobbe Martens Olson & Bear, July 18, 2017: US09710868

In one embodiment, a method includes generating, by a computer system, a search-engine query from stored identity-theft nomenclature. The method also includes querying, by the computer system, at least one search engine via the search-engine query. Further, the method includes crawling, by the compu ...


2
Harold E Gottschalk Jr, Michael Caldwell, Joel Carleton: System and methods for identifying compromised personally identifiable information on the internet. CSIDENTITY CORPORATION, Winstead PC, January 31, 2017: US09558368

In one embodiment, a method includes generating, by a computer system, a search-engine query from stored identity-theft nomenclature. The method also includes querying, by the computer system, at least one search engine via the search-engine query. Further, the method includes crawling, by the compu ...


3
Harold E Gottschalk Jr, Michael Caldwell, Joel Carleton: System and methods for identifying compromised personally identifiable information on the internet. CSIDENTITY CORPORATION, Winstead PC, January 12, 2016: US09235728

In one embodiment, a method includes generating, by a computer system, a search-engine query from stored identity-theft nomenclature. The method also includes querying, by the computer system, at least one search engine via the search-engine query. Further, the method includes crawling, by the compu ...


4
Harold E Gottschalk JR, Michael Caldwell, Joel Carleton: System and methods for identifying compromised personally identifiable information on the internet. August 23, 2012: US20120215758-A1

In one embodiment, a method includes generating, by a computer system, a search-engine query from stored identity-theft nomenclature. The method also includes querying, by the computer system, at least one search engine via the search-engine query. Further, the method includes crawling, by the compu ...



Click the thumbnails below to visualize the patent trend.