Techniques for protecting personally identifiable information are described. In an implementation, a method is described which includes analyzing heuristics which correspond to a communication to determine a likelihood that the communication relates to a fraudulent attempt to obtain personally identifiable information. A determination is made based on the determined likelihood of whether to perform one or more actions in conjunction with the communication.

 
Web www.patentalert.com

< Method and apparatus for supporting asymmetric multi-threading in a computer system

> Restricted software and hardware usage on a computer

> System and method for authenticating digital content

~ 00549