“Sensitive Data Identification In Real Time For Data Streaming” in Patent Application Approval Process (USPTO 20210336928): Patent Application – Insurance News Net

Insurance Daily News

2021 NOV 12 (NewsRx) — By a News Reporter-Staff News Editor at Insurance Daily News — A patent application by the inventors Biller, Ofer Haim (Midreshet Ben Gurion, IL); Sofer, Oded (Midreshet Ben Gurion, IL), filed on April 23, 2020, was made available online on October 28, 2021, according to news reporting originating from Washington, D.C., by NewsRx correspondents.

This patent application has not been assigned to a company or institution.

The following quote was obtained by the news editors from the background information supplied by the inventors: “Identifying and protecting sensitive data is critical for data protection and for meeting regulation requirements (general data protection regulation (GDPR), the California consumer privacy act (CCPA), the health insurance portability and accountability act (HIPAA), payment card industry data security standard (PCI DSS), Sarbanes-Oxley Act (SOX), Iso27000, Etc.). A data firewall, for example Guardium®, may provide automated discovery and classification of sensitive data, data activity monitoring and discovery of unusual activity around sensitive data. The data firewall may protect against unauthorized data access by learning regular user access patterns and can provide alerts on suspicious activities.

“The data firewall typically captures or sniffs data accesses to a database (e.g., requests and responses) in real-time and analyzes the data according to policy rules to identify sensitive data. The data firewall may include a data activity monitor (DAM) and/or file activity monitor (FAM). The requests and responses sniffed by the data firewall may include data packets that may include a query, e.g., a structured query language (SQL) requests, or a response, and associated header information. The header may include metadata such as machine information, network information, user information, client information, etc.

“The classification of data may be performed by parsing the captured data packets, extracting the mapping between the metadata and data (e.g., field name for every value), running a rule engine against the metadata and then scanning the data itself to identify sensitive data. Currently, DAM and FAM products are classifying the captured data offline due to the complexity and performance requirements of the classification process. However, using the classifier in offline mode may be too late for preventing data breach or data tampering.

Allianz 728x90 2021 10 ProxyEgg “Sensitive Data Identification In Real Time For Data Streaming” in Patent Application Approval Process (USPTO 20210336928): Patent Application - Insurance News Net

“Therefore, a method for online classification and identification of sensitive data for data streaming is required.”

In addition to the background information obtained for this patent application, NewsRx journalists also obtained the inventors’ summary information for this patent application: “According to embodiments of the invention, a system and method for classifying data in real-time may include may include: capturing a plurality of data packets flowing between a data source machine and a data client; searching at least one of the data packets for tokens associated with sensitive information; if tokens associated with sensitive information are not found in a data packet: allowing the data packet to flow between the data source machine and the data client; and sending the data packet to a comprehensive security analysis; and if tokens associated with sensitive information are found in the data packet: preventing the data packet form flowing between the data source machine and the data client; sending the data packet to a comprehensive security analysis.

“Furthermore, if tokens associated with sensitive information are found in the data packet, embodiments of the invention may include continuing to prevent the data packet from flowing between the data source machine and the data client if the comprehensive security analysis finds security issues: and allowing the data packet to flow between the data source machine and the data client if the comprehensive security analysis finds no security issues.

“According to embodiments of the invention, the data source machine may be selected from: a database server, a file server, a proxy and a database server, a combination of a proxy and a file server, a combination of a network gate and a database server, and a combination of a network gate and a file server.

“According to embodiments of the invention, the data packet may be one of: a query sent from the data client to the data source machine, and a response sent from the data source machine to the data client.

“According to embodiments of the invention, capturing and searching may be performed by a software agent that is installed on the data source machine.

“According to embodiments of the invention, performing a comprehensive security analysis may be performed by a dedicated security server, and wherein the data packet is sent to the dedicated security server for performing the comprehensive security analysis.

“According to embodiments of the invention, searching the data packet for tokens associated with sensitive information may include at least one of: wildcard search, pattern search and dictionary search.

“Embodiments of the invention may include updating the tokens associated with sensitive information based on results of the comprehensive security analysis.

“According to embodiments of the invention, the comprehensive security analysis may include: parsing the data packet; mapping metadata to data; building hierarchy of the data; and processing policy rules.

“Embodiments of the invention may include issuing a security alert if tokens associated with sensitive information are found in the data packet and if the comprehensive security analysis finds security issues.

“Embodiments of the invention may include: after capturing, decrypting the plurality of data packets to obtain a header of each packet; analyzing the headers to determine security status of packets associated with the headers; and selecting the at least one data packet based on the security status.

“It will be appreciated that for simplicity and clarity of illustration, elements shown in the figures have not necessarily been drawn to scale. For example, the dimensions of some of the elements may be exaggerated relative to other elements for clarity. Further, where considered appropriate, reference numerals may be repeated among the figures to indicate corresponding or analogous elements.”

The claims supplied by the inventors are:

“1. A method for classifying data in real-time, the method comprising: capturing a plurality of data packets flowing between a data source machine and a data client; searching at least one of the data packets for tokens associated with sensitive information; if tokens associated with sensitive information are not found in a data packet: allowing the data packet to flow between the data source machine and the data client; and sending the data packet to a comprehensive security analysis; and if tokens associated with sensitive information are found in the data packet: preventing the data packet form flowing between the data source machine and the data client; and sending the data packet to a comprehensive security analysis.

“2. The method of claim 1, comprising, if tokens associated with sensitive information are found in the data packet: continuing to prevent the data packet from flowing between the data source machine and the data client if the comprehensive security analysis finds security issues; and allowing the data packet to flow between the data source machine and the data client if the comprehensive security analysis finds no security issues.

“3. The method of claim 1, wherein the data source machine is selected from the list consisting of: a database server, a file server, a proxy and a database server, a combination of a proxy and a file server, a combination of a network gate and a database server, and a combination of a network gate and a file server.

“4. The method of claim 1, wherein the data packet is one of: a query sent from the data client to the data source machine, and a response sent from the data source machine to the data client.

“5. The method of claim 1, wherein capturing and searching are performed by a software agent that is installed on the data source machine.

“6. The method of claim 5, wherein performing a comprehensive security analysis is performed by a dedicated security server, and wherein the data packet is sent to the dedicated security server for performing the comprehensive security analysis.

“7. The method of claim 1, wherein searching the data packet for tokens associated with sensitive information comprises at least one of: wildcard search, pattern search and dictionary search.

“8. The method of claim 1, comprising: updating the tokens associated with sensitive information based on results of the comprehensive security analysis.

“9. The method of claim 1, wherein the comprehensive security analysis comprises: parsing the data packet; mapping metadata to data; building hierarchy of the data; and processing policy rules.

“10. The method of claim 1, comprising: issuing a security alert if tokens associated with sensitive information are found in the data packet and if the comprehensive security analysis finds security issues.

“11. The method of claim 1, comprising: after capturing, decrypting the plurality of data packets to obtain a header of each packet; analyzing the headers to determine security status of packets associated with the headers; and selecting the at least one data packet based on the security status.

“12. A system for classifying data in real-time, the system comprising: a memory; and a processor configured to: capture a plurality of data packets flowing between a data source machine and a data client; search at least one of the data packets for tokens associated with sensitive information; if tokens associated with sensitive information are not found in a data packet: allow the data packet to flow between the data source machine and the data client; and send the data packet to a comprehensive security analysis; and if tokens associated with sensitive information are found in the data packet: prevent the data packet form flowing between the data source machine and the data client; and send the data packet to a comprehensive security analysis.

“13. The system of claim 12, wherein if tokens associated with sensitive information are found in the data packet, the processor is configured to: continue to prevent the data packet from flowing between the data source machine and the data client if the comprehensive security analysis finds security issues; and allow the data packet to flow between the data source machine and the data client if the comprehensive security analysis finds no security issues.

“14. The system of claim 12, wherein the data source machine is selected from the list consisting of: a database server, a file server, a proxy and a database server, a combination of a proxy and a file server, a combination of a network gate and a database server, and a combination of a network gate and a file server.

“15. The system of claim 12, wherein the data packet is one of: a query sent from the data client to the data source machine, and a response sent from the data source machine to the data client.

“16. The system of claim 12, wherein that the processor is installed on the data source machine, and wherein performing a comprehensive security analysis is performed by a dedicated security server, and wherein the processor is configured to send the data packet to the dedicated security server for performing the comprehensive security analysis.

“17. The system of claim 12, wherein searching the data packet for tokens associated with sensitive information comprises at least one of: wildcard search, pattern search and dictionary search.

“18. The system of claim 12, wherein the processor is configured to: update the tokens associated with sensitive information based on results of the comprehensive security analysis.

“19. The system of claim 12, wherein the processor is configured to: issue a security alert if tokens associated with sensitive information are found in the data packet and if the comprehensive security analysis finds security issues.

“20. The system of claim 12, wherein the processor is configured to: after capturing, decrypt the plurality of data packets to obtain a header of each packet; analyze the headers to determine security status of packets associated with the headers; and select the at least one data packet based on the security status.”

URL and more information on this patent application, see: Biller, Ofer Haim; Sofer, Oded. Sensitive Data Identification In Real Time For Data Streaming. Filed April 23, 2020 and posted October 28, 2021. Patent URL: https://appft.uspto.gov/netacgi/nph-Parser?Sect1=PTO1&Sect2=HITOFF&d=PG01&p=1&u=%2Fnetahtml%2FPTO%2Fsrchnum.html&r=1&f=G&l=50&s1=%2220210336928%22.PGNR.&OS=DN/20210336928&RS=DN/20210336928

(Our reports deliver fact-based news of research and discoveries from around the world.)

Source of this news: https://insurancenewsnet.com/oarticle/sensitive-data-identification-in-real-time-for-data-streaming-in-patent-application-approval-process-uspto-20210336928-patent-application

Related posts:

Solution to watch restricted YouTube presentations without signing in? important Gadget Bridge
Streaming YouTube has become a synonym available for watching videos on the internet. Facebook uploads a wide range of content cross binge-watch with no difficulties. But rather YouTube does also...
46 Best wifi router for multiple devices in 2021: According to Experts. - Game Polar
You could get any random wifi router for multiple devices, but if you’re looking for expert advice on choosing the best one for your needs then you’ve arrived at the right place. It doesn’t matter wh...
What IT Admins Can Learn From Microsoft's U.S. Government Zero Trust Strategy - TechDecisions
Microsoft this week published along blog post about how the IT giant is helping U.S. federal agencies adopt a Zero Trust architecture and comply with President Joe Biden’s executive order on cybersec...
How MinIO Brings Object Storage Service to Kubernetes – The New Stack - thenewstack.io
MinIO is a popular open source object storage service that exposes an S3-compatible endpoint. It was initially available as a tiny binary written in Golang that could turn any directory on the host ...
'I let the community down' viewpoint Kaseya CEO explains the server restart was spurred back followi...
Kaseya's CEO has apologised to its customers punch by last week's cyber-attack and says the restart from the VSA servers has been stressed back until Sunday to enable extra security measures to g...
More In-Person Scouting Looks, Headlined by Frankie Montas' Sim Game - Fangraphs
Gary A. Vasquez-USA TODAY Sports Frankie Montas was a late scratch from his Saturday start and instead, on Sunday, threw in an early-morning sim game on Oakland’s backfields. Opposing scouts in atten...
Why Should You Use Proxy Rotation Tools? - The Union Journal
Proxy Rotation ToolsWhile there are many possible solutions to hiding your identity online and browsing from a different IP, a proxy rotator might be the best one. A proxy rotator, or proxy rotation ...
Facebook proxy servers for the gaming publication rack - GLYFE Nation
Within the last few decade, the lack of privacy plus security on the web has become a widely used topic for advocates associated humane technology and mysterious internet. The leaps people make...
What Are The Different Types Of Proxy Server A Person Can Choose From? - Programming Insider
Do you know what a proxy server is? The router or the system provides a medium between the users and the internet. It helps in preventing the cyber net that can attack your system; it keeps the atta...
Chinese miners are back in action.What implications does this have on Bitcoin mining difficulty? – C...
Bitcoin is undoubtedly an asset that offers many advantages over fiat money, such as the decentralization of its production. However, it is no secret to anyone that there are regions of the world whe...
Reissuing requests with Burp Repeater - The Daily Swig
In this tutorial, you'll use Burp Repeater to reissue an interesting request over and over again. This lets you study the target website's response to different input without having to intercept the...
TrickBot Spruces Up Its Banking Trojan malware Module - Threatpost
The conductor of your personal data may possibly be Threatpost, Inc., 500 Unicorn Park, Woburn, MA 01801. Detailed information on the dealing of personal data can be found in any policy . In ad...
Zenscrape Review: Website HTML Extraction - Designmodo
Share Share Tweet Share Pin It ResourcesEditorial • October 09, 2019 • 5 minutes READ Over time, data has become the core of business strategies and market research. It is being termed as th...
Beware the low-cost proxy - TechRadar
In the last few years, residential proxy networks have become an essential tool for business operations across many sectors. However, I will not be telling you about all the benefits of this practice...
Analyst says iPhone 13 will make calls even without a cellular signal - Lodi Valley News.com
With the expected launch of the next generation iPhone appears to be coming to an end (Will it be in September?), rumors and speculation are spreading around the world, seeking to anticipate news of...
virus? windows updates and important security updates are not installing - Virus, Trojan, Spyware, a...
I was told to post this here via a topic I posted previously. Logs are attached to that post as well as new logs posted here. Also note that the computer that I mentioned in my previous post that had...
Study connects hyperglycemia and prolonged cloth mask use to COVID-19-associated mucormycosis risk -...
A new study conducted in India identifies the role of high blood sugar levels in predisposing patients to mucormycosis infection. The study, which is available on the preprint server medRxiv*, also p...
Very next Article Shotcut 21. 05. 18 - Neowin
Shotcut is a free, open source, cross-platform video editor for The computer, Mac and Linux. Fundamental features include support for wide range of formats; no significance required meaning nativ...

IP Rotating Proxy Onsale

SPECIAL LIMITED TIME OFFER

00
Months
00
Days
00
Hours
00
Minutes
00
Seconds
First month free with coupon code FREE30