Systems and methods for reporting the attempted transmission of sensitive information
First Claim
1. A computer-implemented method, performed by a computing device comprising at least one processor, for protecting user data privacy, the method comprising:
- identifying a software program, running on the computing device, to which a user of the computing device granted access to his or her sensitive data when installing the software program;
monitoring networking hardware on the computing device to detect a plurality of attempts by the software program to transmit data to one or more intended recipients and to identify one or more owners of one or more network resources associated with the intended recipients, the network resources comprising at least one of a network address, a computing device, an Internet domain, and an email account;
determining that the data of the attempted transmissions includes sensitive information, wherein the sensitive information comprises personal information describing the user;
aggregating the plurality of attempts into a postcard display that displays summaries of the aggregated attempts, categorized by the software program and by the identified owners;
notifying a user of the computing device that the software program is attempting to transmit sensitive information and of the intended recipients of the attempted transmissions by displaying the postcard display to the user via a communication interface of the computing device.
6 Assignments
0 Petitions
Accused Products
Abstract
The disclosed computer-implemented method for reporting the attempted transmission of sensitive information may include (1) identifying an attempt by at least one software program running on a computing device to transmit data to one or more intended recipients, (2) determining that the data of the attempted transmission includes sensitive information, (3) identifying an intended recipient of the attempted transmission, and (4) notifying a user of the computing device both that the attempted transmission includes sensitive information and of the intended recipient of the attempted transmission. Various other methods, systems, and computer-readable media are also disclosed.
30 Citations
20 Claims
-
1. A computer-implemented method, performed by a computing device comprising at least one processor, for protecting user data privacy, the method comprising:
-
identifying a software program, running on the computing device, to which a user of the computing device granted access to his or her sensitive data when installing the software program; monitoring networking hardware on the computing device to detect a plurality of attempts by the software program to transmit data to one or more intended recipients and to identify one or more owners of one or more network resources associated with the intended recipients, the network resources comprising at least one of a network address, a computing device, an Internet domain, and an email account; determining that the data of the attempted transmissions includes sensitive information, wherein the sensitive information comprises personal information describing the user; aggregating the plurality of attempts into a postcard display that displays summaries of the aggregated attempts, categorized by the software program and by the identified owners; notifying a user of the computing device that the software program is attempting to transmit sensitive information and of the intended recipients of the attempted transmissions by displaying the postcard display to the user via a communication interface of the computing device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A system for reporting the attempted transmission of sensitive information, the system comprising:
-
an identification module, stored in memory of a computing device, that; identifies a software program, running on the computing device, to which a user of the computing device granted access to his or her sensitive data when installing the software program; monitors networking hardware on the computing device to detect a plurality of attempts by the software program to transmit data to one or more intended recipients and to identify one or more owners of one or more network resources associated with the intended recipients, the network resources comprising at least one of a network address, a computing device, an Internet domain, and an email account; a security module, stored in memory, that determines that the data of the attempted transmissions includes sensitive information, wherein the sensitive information comprises personal information describing the user; an analysis module, stored in memory, that aggregates the plurality of attempts into a postcard display that displays summaries of the aggregated attempts, categorized by the software program and by the identified owners; a notification module, stored in memory, that notifies a user of the computing device that the software program is attempting to transmit sensitive information and of the intended recipients of the attempted transmissions by displaying the postcard display to the user via a communication interface of the computing device. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A non-transitory computer-readable medium comprising one or more computer-readable instructions that, when executed by at least one processor of a computing device, cause the computing device to:
-
identify a software program, running on the computing device, to which a user of the computing device granted access to his or her sensitive data when installing the software program; monitor networking hardware on the computing device to detect a plurality of attempts by the software program to transmit data to one or more intended recipients and to identify one or more owners of one or more network resources associated with the intended recipients, the network resources comprising at least one of a network address, a computing device, an Internet domain, and an email account; determine that the data of the attempted transmissions includes sensitive information, wherein the sensitive information comprises personal information describing the user; aggregate the plurality of attempts into a postcard display that displays summaries of the aggregated attempts, categorized by the software program and by the identified owners; notify a user of the computing device that the software program is attempting to transmit sensitive information and of the intended recipients of the attempted transmissions by displaying the postcard display to the user via a communication interface of the computing device. - View Dependent Claims (20)
-
Specification