System and Method for Preventing Identity Theft or Misuse by Restricting Access

ABSTRACT

A system and method for network file filtering to prevent identity theft or misuse by restricting access to files likely to contain sensitive data is disclosed. The file filtering process includes scanning at least one data file for density of a selected pattern. Files identified as containing the selected pattern may be further analyzed to determine the likelihood of the presence of sensitive information. The process may also include restricting access to files that are identified as likely to contain sensitive information.

CROSS REFERENCE TO RELATED APPLICATION

This application is a continuation-in-part of U.S. patent application Ser. No. 10/126,920, filed on Apr. 19, 2002 and titled System and Method For Preventing Identity Theft or Misuse By Restricting Access, which application claims priority from U.S. Provisional Patent Appln. Ser. No. 60/284,940, filed Apr. 20, 2001 and titled System and Method For Network File Filtering, the contents of which are herein incorporated by reference.

FIELD OF THE INVENTION

The invention relates to the field of data security. More particularly, the invention relates to detecting and protecting sensitive data, such as personally identifiable information (“PII”), in computer files. The invention also relates to systems and methods for restricting access to files that have been identified as likely containing sensitive data, such as PII, and for providing security, such as restricted access and/or encryption, for those files.

BACKGROUND OF THE INVENTION

Many businesses receive correspondence, such as from customers or vendors, which may contain sensitive data, such as confidential financial information. This correspondence may be stored in computer data files. For example, the stored correspondence may include emails that are stored in email archives or other storage. The stored correspondence may also include documents scanned into a computer system and stored as text or other data files. Often sensitive and confidential information is stored in business computer data files, such as PII.

PII is information which might be used to uniquely identify, contact, or locate a single person, either alone or in combination with some other information, or from which identifiable information can be derived. PII includes such information as name; national identification number; telephone number; street address; email address; IP address; vehicle registration number; driver's license number; biometrics; financial profiles; credit card numbers; and digital identity.

A number of laws have been enacted in the last several years to protect confidential information of individuals, such as PII. For instance, Canada has enacted the Privacy Act and the Personal Information Protection and Electronic Documents Act (PIPEDA). Legal frameworks in the European Union to protect privacy include Article 8 of the European Convention on Human Rights; Directive 95/46/EC (Data Protection Directive); and Directive 2002/58/EC (the E-Privacy Directive). Additional information on efforts to protect privacy in the European Union can be found at the website <<http://ec.europa.eu/justice_home/fsj/privacy/index_en.htm>>. Individual European countries also have enacted privacy protection, for example the UK Data Protection Act of 1998; the Irish Data Protection Acts of 1998 and 2003; and the UK Regulation of Investigatory Powers Act of 2000.

Both the United States and individual states have similarly enacted laws to protect sensitive and confidential information, including PII. The Constitution of the State of California includes a right to privacy in Article 1, Section 1. California also passed the Online Privacy Protection Act (OPPA) of 2003 which requires all owners of commercial web sites or online services that collect personal information from California residents to conspicuously post their privacy policies on their websites and comply with those posted policies; disclose in the privacy policies the types of PII collected and must identify, generally, any third parties with whom that information might be shared, and under what circumstances; provide a description of the process (if one exists), by which a visitor can request changes to any of that information; describe the process by which the operator of a Web site notifies users of changes to that privacy policy; and identify the effective date of the privacy policy.

Federal laws in the United States to protect PII include the Privacy Act of 2005; the Information Protection and Security Act; the Identity Theft Prevention Act of 2005; the Online Privacy Protection Act of 2005; the Consumer Privacy Protection Act of 2005; the Anti-phishing Act of 2005; the Social Security Number Protection Act of 2005; and the Wireless 411 Privacy Act.

Files containing sensitive and protected information may be accessible by a large number of people in a data-driven company, such as a bank. Since it is not always known which files contain sensitive information, when they were received or archived, or where they are currently stored, it is sometimes difficult to identify and protect the files that contain sensitive information. The files containing sensitive information may occupy a large amount of space in a computer system. It is time consuming to go through each file to determine if sensitive information is contained in the files.

BRIEF SUMMARY OF THE INVENTION

The inventions disclosed herein relate to a system and method to “filter” files for PII and other sensitive information, to identify files likely to contain such sensitive information and to protect those files.

According to one embodiment the invention, a system and method for network file filtering includes scanning at least one data file for the density of a selected pattern, for example a pattern that tends preferentially to be present in proprietary data in the business area of the data being filtered. Additionally, files containing the selected pattern may be further analyzed to filter the files for sensitive information. For example, the data may be analyzed to see if it contains a valid check digit. The system and method of the invention can then restrict access to the file if the density of the selected pattern in the text file is greater than or equal to a predetermined key word density threshold, and/or if further analysis indicates that sensitive data are likely to be contained in the file.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a block diagram illustrating one embodiment of a system suitable for implementing the network file filtering system and method according to the invention;

FIG. 2 is a block diagram of one embodiment of a file filtering system according to the invention;

FIG. 3 is a flow diagram illustrating one method of filtering files according to the invention; and

FIG. 4 is a flow diagram illustrating another embodiment of a method for filtering files according to the invention.

DETAILED DESCRIPTION OF THE INVENTION

The invention is described in relation to a network file filtering system and method. The characteristics and parameters pertaining to the system and method may be applicable to other types of file filtering systems and other data or file identification or search systems. Like elements are referred to using like numerals for clarity throughout the drawings and description.

FIG. 1 is a block diagram illustrating one embodiment of a system 10 implementing the file filtering system and method according to the invention. The system 10 includes network nodes or sites 1-4, a network 5 and a file filtering system 6. In one embodiment, a file filtering system may reside on one of the sites 1-4. In the embodiment illustrated, file filtering system 6 resides at site 4. In one embodiment, file filtering system 6 may reside on a plurality of sites 1-4 or at all sites 1-4 of the system 10.

Although only four sites or nodes 1-4 are shown, any number of sites 1-4 may exist in system 10. In one embodiment, system 10 may include only one site 1-4. In another embodiment, system 10 may include as many sites as necessary or desired by a user.

In one embodiment, system 10 may include a server for managing network-related traffic. In one embodiment, each of sites 1-4 may include a network server. The server may be or include, for instance, a workstation running Microsoft Windows™ NT™, Windows™ 2000, Windows™ Vista™, Windows XP™, Windows™ Mobile™, Unix, Linux, Xenix, IBM AIX™, Hewlett-Packard UX™, Novell Netware™, Sun Microsystems Solaris™, OS/2™, BeOS™, Mach, Apache, OpenStep™, Mac OS X™, GAME BOY™, PXP™ or any other operating system or platform now known or later developed.

Each of sites 1-4 may communicate to each other and to network 5 through communications link 7. Communications link 7 may be a part of network 5 in one embodiment. Communications link 7 may be, include or interface to any one or more of, for instance, point-to-point communication, such as with a dedicated line or via the Internet, an intranet, a PAN (Personal Area Network), a LAN (Local Area Network), a WAN (Wide Area Network) or a MAN (Metropolitan Area Network), a frame relay connection, an Advanced Intelligent Network (AIN) connection, a synchronous optical network (SONET) connection, a digital T1, T3 or E1 line, Digital Data Service (DDS) connection, DSL (Digital Subscriber Line) connection, an Ethernet connection, an ISDN (Integrated Services Digital Network) line, a dial-up port such as a V.90, V.34 or V.34bis analog modem connection, a cable modem, an ATM (Asynchronous Transfer Mode) connection, or FDDN (Fiber Distributed Data Networks) or CDDI (Copper Distributed Data Interface) connections.

Communications link 7 may furthermore be, include or interface to any one or more of a WAP (Wireless Application Protocol) link, a GPRS (General Packet Radio Service) link, a GSM (Global System for Mobile Communication) link, a CDMA (Code Division Multiple Access) or TDMA (Time Division Multiple Access) link such as a cellular phone channel, a GPS (Global Positioning System) link, CDPD (cellular digital packet data), a RIM (Research in Motion, Limited) duplex paging type device, a Bluetooth™ radio link, or an IEEE 802.11-based radio frequency link. Communications link 7 may yet further be, include or access any one or more of an RS-232 serial connection, an IEEE-1394 (Firewire) connection, an IrDA (infrared) port, a SCSI (Small Computer Serial Interface) connection, a USB (Universal Serial Bus) connection or other wired or wireless, digital or analog interface or connection.

Sites 1-4 may communicate with each other and to network 5 using network enabled code. Network enabled code may be, include or interface to, for example, Hyper text Markup Language (HTML), Dynamic HTML, Extensible Markup Language (XML), Extensible Stylesheet Language (XSL), Document Style Semantics and Specification Language (DSSSL), Cascading Style Sheets (CSS), Synchronized Multimedia Integration Language (SMIL), Wireless Markup Language (WML), Java™, Jini™, C, C++, Perl, UNIX Shell, Visual Basic or Visual Basic Script, Virtual Reality Markup Language (VRML), ColdFusion™ or other compilers, assemblers, interpreters or other computer languages or platforms.

FIG. 2 is a block diagram illustrating one embodiment of a file filtering system according to the invention. File filtering system 6 of FIG. 1 may include a scanning module 22, a restricting system 24 and a database 26. In one embodiment, scanning module 22 may be used to scan files stored at sites 1-4 of a system 10 for confidential financial information such as credit card numbers. Restricting system 24 may be used to restrict the files found to have confidential financial information from access by unauthorized user or uses.

Database 26 may be used to store data regarding scanning criteria, restricting criteria, scanning and restricting algorithms, identification of files that need to be restricted and any other data associated with filtering files having sensitive information in a system 10. The database 26 may be, include or interface to, for example, the Oracle™ relational database sold commercially by Oracle Corp. Other databases, such as Informix™, DB2 (Database 2), Sybase or other data storage or query formats, platforms or resources such as OLAP (On Line Analytical Processing), SQL (Standard Query Language), a storage area network (SAN), Microsoft Access™ or others may also be used, incorporated or accessed in the invention.

FIG. 3 is a flow diagram illustrating one embodiment of a method for filtering files in a system 10. At step 301, the scanning module 22 may scan data files in system 10 for density of a key word. At step 302, the restricting system 24 may restrict access to each file having a key word density greater than or equal to a threshold density.

As will be described in more detail below, the various processes illustrated in FIG. 3 may be performed by a system, such as the system illustrated in FIGS. 1 and 2. The steps illustrated in FIG. 3 will now be described in greater detail.

At step 301, the scanning module 22 may scan at least one data file and the system 10 for density of a selected pattern. In one embodiment, scanning the data files for the density of a selected pattern may include scanning the data file for occurrences of the selected pattern and determining the density of the selected pattern in the data file. In one embodiment, the density of the selected pattern may be determined by dividing the number of occurrences of the selected pattern by the size of the data file which may be given in any format known today or later developed.

In one embodiment, scanning the data file for the selected pattern density may also include comparing the density of the selected pattern in the file to a threshold density. In one embodiment, the threshold density may be a predetermined threshold density. In another embodiment, the threshold density may be a selectable threshold density. The threshold density may be selected by a systems administrator or other user. The threshold density may be selected based on the type of data being scanned. The types of data being scanned may include ASCII (American Standard Code for Information Interchange) text, streaming audio, graphics, etc.

In one embodiment, the threshold density may be selected based on the length of the file. For example, the longer the file is, the lower the threshold density. In one embodiment, the threshold density may be a variable threshold density that varies with the size of the file scanned.

In one embodiment, the threshold density may be determined after analyzing the selected pattern density in at least one data file. The threshold density may be based on predetermined formulas or trial and error methods.

In one embodiment, the selected pattern may include a key word string. In one embodiment, the key word string may be a key word string of a predetermined length including at least one predetermined substring. For example, the key word string may be a numeric string having a length equal to the length of a standard credit card number. In one embodiment, the predetermined substring may be a substring associated with a specific credit card issue. For example, the substring may be the first four digits of a credit card number identifying a specific bank issuing the credit card if the filtering is being done by a bank or other financial service company. The key word string may also be alphanumeric or comprise other characters in addition to alphanumeric characters.

The selected pattern may be any pattern that may be used in an industry for sensitive information. Thus, the pattern may be determined by finding patterns that tend preferentially to be present in proprietary data in the business area of the data being filtered. For example, if the filtering is being performed by a chemical company, a chemical name or process technical term may be used for the selected pattern. In the financial services industry, the selected pattern may comprise the format of a credit card number, i.e. a string of numbers either 15 or 16 digits in length. In another embodiment, the selected pattern may include a non-text pattern. For example, the selected pattern may be a symbol or other graphic representation.

In one embodiment, the selected pattern may include a plurality of selected patterns. For example, the selected patterns may include social security number, date of birth, and credit card number. The threshold density of the selected patterns may be an aggregate threshold density. For example, the density of the set of selected patterns may calculated by determining the individual density of each selected pattern. The individual densities of the selected patterns that are predetermined to be “less useful” may be subjected to a range constraint so that if the individual density of the less useful pattern is below the range, the individual density will be set to the minimum density of the range. All of the individual densities may be multiplied together to produce a product density. The product density may then be compared to the aggregate threshold density. The aggregate threshold density may be determined empirically.

In one embodiment, files that are determined to include the selected pattern or patterns may be subjected to further analysis. For example, files that are identified using the selected pattern may be analyzed to see if the data that comprise the selected pattern(s) within that file contain a check digit. A check digit is a form of redundancy check used for error detection that consists of a single digit computed from the other digits in the message. In this embodiment, files may be identified according to a key word string. The identified files may then be further scanned for a check digit that corresponds to the type of information that tend preferentially to be present in proprietary data in the business area of the data being filtered by the key word string.

For example, the key word string may correspond to a standard credit card number. Files that are identified as containing the key word string search may then be further scanned to see if the data corresponding to the key word string contain a valid check digit for a credit card. In this embodiment, the data that correspond to the key word string may be used to calculate a check digit using the Modulo 10 (Mod 10) formula, also known as the Luhn algorithm (as described in U.S. Pat. No. 2,950,048 to Luhn, titled Computer for Verifying Numbers). The calculated check digit may be compared to the data that correspond to the check digit in the credit card number. For example, the check digit for many popular credit cards (VISA™, MasterCard™, Discovery™, American Express™) is the final digit of the credit card number. Accordingly, if the data that correspond to the key word string also contain a valid Mod 10 check digit, then it is likely that the file contains sensitive credit card information.

Other examples of information that use check digits include Universal Product

Codes; ISBNs, National Provider Identifiers, used in the healthcare industry; the North American CUSIP number; the International SEDOL number; the International Securities Identifying Number (ISIN); the International CAS registry number's final digit; the final digit of a POSTNET code; the final digit of an ISSN code; the final digit of a DUNS number; and the ninth digit of a Vehicle Identification Number (VIN).

By combining several selected patterns or discriminators that are particularly usable, in the manner described above, a discriminator may be obtained that performs much better than any of the individual selected patterns. A well chosen combination of selected patterns may result in filtering that produces a very low alarm rate (rate of filtering files that do not need filtering). For example, in a financial services company, a combination of addresses and credit card numbers may produce an alarm rate of less than 10%. Protecting the extra 10% of files would be negligible overhead compared to the time and cost investment of examining each data file for sensitive data.

In one embodiment, the selected threshold density may be predetermined based on the type of data for which the scan is performed. In another embodiment, the selected threshold density may be selected after scanning at least one data file to determine what the selected pattern should be. The selected threshold density may be selected by a user or selected by performing an electronically performed algorithm to select the selected pattern.

In another embodiment, identified files that are found to have an accurate check digit in the portion of the file that corresponds to all or part of the special pattern may further be analyzed to determine if the percentage of accuracy exceeds that which would be expected in random data. For example, in a document where random data appear to match credit card numbers, normally the check digit will be correct only 10% of the time. By examining the fraction of credit card number patterns that pass the check digit test, it is possible to tell when this fraction significantly exceeds 10%, which gives a very good indication that genuine credit card numbers are present. Similar logic can be used anywhere that data with check digits or error detecting components exist, since the properties of the checking information will be reflected in the statistics of data found in files, and will differ from random or accidentally matching data.

At step 302, the restricting system 24 may restrict access to each file where the selected pattern density is greater than or equal to the threshold density, or where the files are located from the key word string search. In another embodiment, the restricting system 24 may restrict access to each file identified by the use of a combination of selected patterns or discriminators and optionally further analysis.

In one embodiment, restricting access to the file may include activating a security system for each file having a selected pattern density greater than or equal to a threshold density and optionally where further analysis confirms the likelihood of the presence of the sensitive data. In one embodiment, the file that is identified as likely to contain sensitive information may be assigned an identifier or label to identify the file as a sensitive file. The identifier or label may alert system 10 to activate restricting system 24 when access of the sensitive file is attempted. In one embodiment, the identifier may be stored in database 26.

In one embodiment, the restricting system may perform an algorithm to restrict access to all files having a sensitive file identifier stored in database 26.

In one embodiment, activating the security system may include scanning the database 26 or all of the files in system 10 to identify data files having an identifier stored in database 26 or having an associated sensitive file identifier.

In one embodiment, the security system may include restricting access to a sensitive file by password protecting the file. In one embodiment, restricting access to a file may include controlling access to the file based on the time of day when a file is being accessed. In one embodiment, access to a sensitive file may be restricted based on the time of day a specific user is trying to access the file. In another embodiment, the sensitive file may be secured by encrypting the file, for example by use of symmetric key encryption such as DES, IDEA or AES; asymmetric or public key encryption; checksums; cyclic redundancy checks; message authentication codes; digital signatures; or combinations or variations of the foregoing. In this embodiment, only persons having the corresponding key can access the information in the sensitive file.

In one embodiment, access to the file may be restricted based on the user trying to access the file. In one embodiment, only certain users or a certain subset of users may have access to the file. For example, for a first set of restricted files, only clerical staff may have access to the files in the first set. For a second set of restricted files, only management may have access to the files of the second set.

In one embodiment, the place of access by the user may be restricted. For example, a user may only be able to access the file from the user's own desktop terminal. In one embodiment, the user may only be able to access the file from a certain central terminal.

In one embodiment, the type of file authorization assigned to the user may be used to restrict access to the file. For example, a user may be authorized to view certain types of files such as financial information, etc. In one embodiment, a person assigned a highly sensitive file authorization may not be able to view a low sensitivity file. In another embodiment, a user having authorization to view low sensitivity files may not have authorization to view files having a higher sensitivity. Thus, there may be a minimum or maximum security authorization, or both, assigned to the file to restrict access.

In one embodiment, the type of privileges authorization assigned to the user may be used to restrict access to a file. In one embodiment, the types of privileges authorization may include privilege to view a file, privilege to copy a file, privilege to back up a file, or privilege to edit a file. In one embodiment, controlling access based on the types of privileges authorized may include a privilege ceiling where a user with a greater amount of privilege than the privilege ceiling may be restricted from accessing the sensitive file. Thus, a user with the privilege of copying or editing files may not have access to a restricted file having a privilege ceiling of viewing the file, whereas a user having a privilege of viewing files would have access to the file.

In one embodiment, controlling access based on the types of privileges authorized may include a privilege floor where a user with a lesser amount of privilege than the privilege floor is restricted from accessing the file. In this embodiment, a user having a privilege of only viewing a file may not have access to a restricted file having a privilege floor of editing the file.

In one embodiment, restricting access to a sensitive file may include hiding the file from an unauthorized access. In one embodiment, hiding the file may include redirecting an unauthorized user to another file in any location of the system 10 when the unauthorized user tries to access the sensitive file.

In one embodiment, restricting access to the file may also include activating an alarm to indicate when an unauthorized access is occurring. In one embodiment, the restricting system 24 may execute site specific commands to gather evidence of what actions an unauthorized user is performing when the unauthorized user is trying to access the sensitive file. The restricting system 24 may execute the site specific commands to gather evidence without exposing the file to the unauthorized user.

In one embodiment, restricting access to the file may include granting identifiers to a file opening process for the file at the time the file is opened and then revoking the identifiers when the file is closed. In one embodiment, the restricting system 24 may prevent a covert code from running in association with the sensitive file. In one embodiment, preventing the covert code from running may include attaching a crypt checksum to the file. In one embodiment, preventing the covert code from running may include attaching a privilege mask to the file.

In one embodiment, full network awareness may be implemented so that an extended access control is very powerful. Cross-network checks for access control may be performed. In one embodiment, distributed firewall checks of access rates may be performed for access control and alarms, providing statistical quality control. Checks can be done of the access frequency of users to files. For example, a clerk who normally must access a customer file to answer phone queries might access a few hundred customer records per day. By watching access frequencies, a clerk accessing thousands of customer records per day might be flagged, since he might be doing this access for unauthorized purposes. Checks of network operations may be used to control files as they are created or inherited from a directory protection profile.

A database management system may be used as a lookup agent. The “change dir” command may be overloaded so that some preselected patterns might imply looking for files flagged with some security labels when seen, instead of selecting file names only, which could allow selection of more attributes including security attributes. This may speed up finding of content. In one embodiment, search engine techniques may be used to populate the database management system. In one embodiment, the database management system may also return “not-yet-classified” files in directory lists. The system may allow full soft linking and full conditioned soft links, not just on access fail. These access control methods, are published in the program Safety, published on the DECUS VMS SIG tapes in 1996. Softlinks are also known to Unix users as “symbolic links”.

FIG. 4 depicts a flow diagram illustrating another embodiment of a method for filtering files according to the invention. At step 401, the density threshold of a selected pattern is determined by, for example, a processor capable of making a density threshold determination. This determination may be made by, for example, analyzing a data file or by performing an algorithm on one or more data files. At 402, a scanning module scans data files in system 10 and determines the density of a selected pattern. This determination may be made as described previously with relation to FIG. 3. At step 403, the system 10 may optionally perform further analysis on the data in the identified files that correspond to the selected pattern. At step 404, the restricting system 24 may restrict access to each file that is determined to likely contain sensitive data based on the density of the selected pattern and optional further analysis of the data that correspond to the selected pattern. This access restriction may comprise password protection of the data file, time of day, user type, place of access, file authorization, privileges authorization or encryption.

As was described in relation to FIG. 3, the various processes illustrated in FIG. 4 may be performed by a system, such as the system illustrated in FIGS. 1 and 2.

A system and method for filtering files is described where the files may stay at the location in which they are stored. Thus, there is no need to add large databases or use additional memory in existing databases to store the files found to include sensitive data. A method for filtering files is described where each file does not have to be read by an individual to determine whether the file contains sensitive data. Thus, the speed of file filtering is greatly increased by using a program to scan documents for selected pattern strings.

While the foregoing description includes many details and specificities, it is to be understood that these have been included for purposes of explanation only, and are not to be interpreted as limitations of the invention. Many modifications to the embodiments described above can be made without departing from the spirit and scope of the invention, as is intended to be encompassed by the following claims and their legal equivalents. 

What is claimed is: 1-20. (canceled)
 21. A computer implemented method of preventing wrongful use of information stored in a computer system of an enterprise, the method comprising: (a) providing a computer system including a database comprising data files, wherein the data files comprise one or more of customer names, addresses, zip codes, contact information, dates of birth, social security numbers, and financial account numbers of one or more of bank accounts, credit card accounts, and debit card accounts, wherein multiple users are authorized by the enterprise to access the system; (b) selecting a key word string, by at least one or more computer processors, comprising an alphanumeric string including at least a portion of numeric data identifying a financial account comprising one or more of bank accounts, credit card accounts, and debit card accounts; (c) scanning, by the at least one or more computer processors, the database for files comprising the key word string; (d) calculating, by the at least one or more computer processors, a check digit from the numeric data in the determined files that correspond to the key word string; (e) validating, by the at least one or more computer processors, the files by comparing the calculated check digit to the numeric data in the files that correspond to the key word string; (f) based on the results of the validation identifying special files by the at least one or more computer processors; (g) receiving, by the at least one or more computer processors, a request to access at least one of the identified special files, and (h) in response to receiving the access request, performing, by the at least one or more computer processors, at least one of the steps comprising: (1) activating an alarm to indicate when unauthorized access to one or more of the special files is occurring or has occurred; (2) password protecting one or more of the special files; (3) controlling access based on one or more of user type, place of user access, user file authorization, and user privileges authorization; (4) executing site specific commands wherein the site specific commands gather evidence of what actions an unauthorized user is undertaking or undertook without exposing one or more of the special files to the unauthorized user; (5) granting at least one identifier to a file opening process for one or more of the special files and revoking the identifier when one or more of the special files are closed; (6) preventing covert code from running in association with one or more of the special files by attaching at least one of a crypt checksum and a privilege mask to one or more of the special files; and (7) encrypting one or more of the special files.
 22. The method of claim 21, further including determining, by the at least one or more computer processors, whether a density of occurrence of the key word string in files that comprise the key word string is greater than a threshold density.
 23. The method of claim 21, further including protecting the special files by moving the identified special files to a secure location.
 24. The method of claim 21, wherein the key word string comprises a credit card number.
 25. The method of claim 21, further comprising calculating the check digit for each identified file only in the event a number of identified files in the database exceeds a predetermined threshold density.
 26. The method of claim 21, wherein the special files are protected only in the event a ratio of special files having a valid check digit to the identified files having no valid check digit exceeds a predetermined ratio.
 27. The method of claim 21, wherein the special files are protected only in the event a percentage of special files having a valid check digit exceeds a percentage that would be found in a random collection of data.
 28. A computer implemented method of preventing wrongful use of information stored in a computer system of an enterprise, the method comprising: (a) providing a computer system including a database comprising data files, wherein the data files comprise one or more of customer names, addresses, zip codes, contact information, dates of birth, social security numbers, and financial account numbers of one or more of bank accounts, credit card accounts, and debit card accounts, wherein multiple users are authorized by the enterprise to access the system; (b) selecting, by at least one or more computer processors a special pattern comprising: a key word string comprising an alphanumeric string including at least a portion of the numeric data identifying a financial account comprising one or more of bank accounts, credit card accounts, and debit card accounts; and a second string structured for identifying one or more of customer names, addresses, zip codes, contact information, dates of birth, and social security numbers; (c) scanning, by the at least one or more computer processors, the database; (d) calculating, by the at least one or more computer processors, a check digit from the numeric data in the determined files that correspond to the key word string; (e) validating, by the at least one or more computer processors, the files by comparing the calculated check digit to the numeric data in the determined files that correspond to one or both of the first keyword string and the second string; (f) based on the results of the validation identifying special files, by the at least one or more computer processors; (g) receiving, by the at least one or more computer processors, a request to access at least one of the identified special files, and (h) in response to receiving the access request, performing, by the at least one or more computer processors, at least one of the steps comprising: (1) activating an alarm to indicate when unauthorized access to one or more of the special files is occurring or has occurred; (2) password protecting one or more of the special files; (3) controlling access based on one or more of user type, place of user access, user file authorization, and user privileges authorization; (4) executing site specific commands wherein the site specific commands gather evidence of what actions an unauthorized user is undertaking or undertook without exposing one or more of the special files to the unauthorized user; (5) granting at least one identifier to a file opening process for one or more of the special files and revoking the identifier when one or more of the special files are closed; (6) preventing covert code from running in association with one or more of the special files by attaching at least one of a crypt checksum and a privilege mask to one or more of the special files; and (7) encrypting one or more of the special files.
 29. The method of claim 28, wherein the density of occurrence of the special pattern comprises dividing the number of occurrences of the special pattern in each data file in the database by the size of the data file.
 30. The method of claim 29, wherein the selected threshold density comprises averaging the density of occurrence of the special pattern for all of the data files in the database.
 31. The method of claim 28, further comprising wherein the special files are protected only in the event the ratio of special files having a valid check digit to the identified files having no valid check digit exceeds a predetermined ratio.
 32. The method of claim 28, wherein the special files are protected only in the event the percentage of special files having a valid check digit exceeds the percentage that would be found in a random collection of data.
 33. A computer system for confidential information wherein multiple users are authorized to access the system, the system comprising: (a) a database comprising data files, wherein the data files comprise one or more of customer names, addresses, zip codes, contact information, dates of birth, social security numbers, and financial account numbers of one or more of bank accounts, credit card accounts, and debit card accounts; (b) at least one computer processor; and (c) a memory device storing computer executable instructions , when executed by the at least one computer processor, cause the at least one computer to perform the method comprising: (i) selecting a key word string comprising an alphanumeric string including at least a portion of the numeric data identifying a financial account comprising one or more of bank accounts, credit card accounts, and debit card accounts; (ii) scanning each data file in the database for the occurrence of the key word string; (iii) calculating a check digit from the numeric data in the determined files that correspond to the keyword string; (iv) validating the files by comparing the calculated check digit to the numeric data in the determined files that correspond to the keyword string; and (v) based on the results of the validation identifying special files; (vi) receiving a request to access at least one of the identified special files; and (vii) performing at least one of the steps rising: (1) activating an alarm to indicate when unauthorized access to one or more of the special files is occurring or has occurred; (2) password protecting one or more of the special files; (3) controlling access based on one or more of user type, place of user access, user file authorization, user privileges authorization; (4) executing site specific commands wherein the site specific commands which gather evidence of what actions an unauthorized user is undertaking or undertook without exposing one or more of the special files to the unauthorized user; (5) granting at least one identifier to a file opening process for one or more of the special files and revoking the identifier when one or more of the special files are closed; (6) preventing covert code from running in association with one or more of the special files by attaching at least one of a crypt checksum and a privilege mask to one or more of the special files; and (7) encrypting one or more of the special files.
 34. The computer system of claim 33, wherein the at least one computer processor for selecting a key word string and the at least one computer processor for protecting the special files are separate processors.
 35. The computer system of claim 33, wherein the at least one computer processor for selecting a key word string and the at least one computer processor for protecting the special files are the same processor.
 36. The computer system of claim 33, wherein the first keyword string comprises a credit card number.
 37. The computer system of claim 36, wherein encrypting the special files comprises public key encryption.
 38. The computer system of claim 33, wherein the at least one processor is further for determining the density of identified files in the database and for calculating the check digit for each identified file only in the event the number of identified files in the database exceeds a predetermined threshold density.
 39. The computer system of claim 33, wherein the at least one processor for moving the identified special files is further for protecting the special files only in the event a ratio of special files having a valid check digit to the identified files having no valid check digit exceeds a predetermined ratio.
 40. The computer system of claim 33, wherein the at least one processor for moving the identified special files is further for protecting the special files only in the event a percentage of special files having a valid check digit exceeds a percentage that would be found in a random collection of data, such percentage constituted by a predetermined value. 