×

Method and system for digital privacy management

  • US 10,498,772 B2
  • Filed: 03/17/2017
  • Issued: 12/03/2019
  • Est. Priority Date: 03/21/2016
  • Status: Active Grant
First Claim
Patent Images

1. A system for managing data privacy, comprising:

  • a processor; and

    a memory, the memory having stored therein;

    a plurality of security modules for provision of at least one data privacy measure for protection of data, the plurality of security modules including at least a token manager and a database manager,wherein said database manager performs operations of;

    masking column-level data with no application code changes;

    integrating with said token manager for tokenization, standard encryption, format preserving encryption and anonymization;

    dynamic tokenization, anonymization and masking rules;

    a security risk controller (SRC) for dynamically modifying security policies, which, when executed by the processor, performs operations of;

    receiving one or both of context data and environmental information from said at least one security module;

    determining, in real time, at least one internalsecurity risk factor from the context data; and

    responsive to said determining, modifying, in real time, a security policy for the at least one data privacy measure;

    said database manager further performing an operation of dynamically enforcing security policy enforcement by the Security Risk Controller;

    the memory having further stored therein;

    a fraud predictor for identifying and reporting users at risk for engaging in malicious behavior, which when executed by the processor performs operations of;

    receiving a plurality of inputs regarding user behavior; and

    analyzing the inputs to identify authorized users/applications displaying anomalous behavior that indicates a malicious propensity;

    said database manager further performing an operation of identifying authorized and unauthorized users'"'"' activities for said Fraud Predictor;

    wherein role-based, need-to-know access is granted only to specific users or groups of users or applications for ensuring data protection; and

    wherein the system is capable of managing the at least one data privacy measure without requiring code changes and without requiring users to modify their computing behavior.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×