Method and system of quantifying risk
First Claim
1. A method of quantifying the risk of releasing security sensitive words, data objects, characters or icons which may be part of data comprising:
- categorizing each one of said security sensitive words, data objects, characters or icons into one of a plurality of categories;
obtaining and compiling preexisting data for each category;
ranking said categories and assigning a rank quantifier to each respective category and preexisting data subsumed therein;
comparing said data to said preexisting data and generating an output representative of all rank quantifiers associated with preexisting data found therein.
1 Assignment
0 Petitions
Accused Products
Abstract
The method of quantifying risk, implemented as a computerized program, quantifies the risk of releasing security sensitive words, data objects, characters or icons which may be part of data subject to analysis (target data). Security words, etc. are categorized, pre-existing data for each category is obtained and the categories (and subsumed pre-existing data) are ranked by risk. The target data is compared to the compiled pre-existing data and a risk output is generated. For unknown or undefined words, an indeterminable category is created and is ranked. The method may include inference engines, and contextual routines to add semantic equivalents and opposites to the critical list. Search engines may be employed to add to the list. A differential rank quantifier is assigned to the security words, etc. which has a different rank than the associated category. Frequency analysis, source analysis and stochastic analysis is also used. The risk output is altered.
109 Citations
141 Claims
-
1. A method of quantifying the risk of releasing security sensitive words, data objects, characters or icons which may be part of data comprising:
-
categorizing each one of said security sensitive words, data objects, characters or icons into one of a plurality of categories;
obtaining and compiling preexisting data for each category;
ranking said categories and assigning a rank quantifier to each respective category and preexisting data subsumed therein;
comparing said data to said preexisting data and generating an output representative of all rank quantifiers associated with preexisting data found therein. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24)
-
-
25. A method of quantifying the risk of releasing security sensitive words, data objects, characters or icons which may be part of data comprising:
-
categorizing said security sensitive words, data objects, characters or icons into one of a plurality of categories;
obtaining and compiling preexisting data for each category;
ranking said categories with respect to each other;
assigning a rank quantifier to each respective category and associating the assigned rank quantifier to preexisting data subsumed in each category;
forming a template which includes said security sensitive words, data objects, characters or icons and the compiled preexisting data; and
generating an output representative of all rank quantifiers associated with security sensitive words, data objects, characters or icons and preexisting data found in said data by comparing said data to said template.
-
-
26. A method of quantifying the risk of releasing security sensitive words, data objects, characters or icons which may be part of data comprising:
-
compiling said security sensitive words, data objects, characters or icons;
associating a respective categorical identifier with each of said security sensitive words, data objects, characters or icons;
subdividing, if necessary, each respective categorical identifier into subcategories;
compiling preexisting data per categorical identifier and subcategory;
ranking said categorical identifiers and, if necessary, said subcategories, with respect to each other, and assigning a rank quantifier to each respective categorical identifiers and subcategory and to said preexisting data compiled for each categorical identifier and subcategory and said security sensitive words, data objects, characters or icons;
forming a template which includes said security sensitive words, data objects, characters or icons and the compiled preexisting data;
generating an output representative of all risk quantifiers associated with said security sensitive words, data objects, characters or icons and the compiled preexisting data found in said data by comparing said data to said template.
-
-
27. A computerized method of quantifying the risk of releasing security sensitive words, data objects, characters or icons which may be part of data in a computer system comprising:
-
categorizing each one of said security sensitive words, data objects, characters or icons into one of a plurality of categories;
obtaining and compiling preexisting data for each category;
ranking said categories and assigning a rank quantifier to each respective category and preexisting data subsumed therein;
comparing said data to said preexisting data and generating an output representative of all rank quantifiers associated with preexisting data found therein. - View Dependent Claims (28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50)
-
-
51. A computerized method of quantifying the risk of releasing security sensitive words, data objects, characters or icons which may be part of data comprising:
-
categorizing said security sensitive words, data objects, characters or icons into one of a plurality of categories;
obtaining and compiling preexisting data for each category;
ranking said categories with respect to each other;
assigning a rank quantifier to each respective category and associating the assigned rank quantifier to preexisting data subsumed in each category forming a template which includes said security sensitive words, data objects, characters or icons and the compiled preexisting data; and
generating an output representative of all rank quantifiers associated with security sensitive words, data objects, characters or icons and preexisting data found in said data by comparing said data to said template.
-
-
52. A computerized method of quantifying the risk of releasing security sensitive words, data objects, characters or icons which may be part of data comprising:
-
compiling said security sensitive words, data objects, characters or icons;
associating a respective categorical identifier with each of said security sensitive words, data objects, characters or icons;
subdividing, if necessary, each respective categorical identifier into subcategories;
compiling preexisting data per categorical identifier and subcategory;
ranking said categorical identifiers and, if necessary, said subcategories, with respect to each other, and assigning a rank quantifier to each respective categorical identifiers and subcategory and to said preexisting data compiled for each categorical identifier and subcategory and said security sensitive words, data objects, characters or icons;
forming a template which includes said security sensitive words, data objects, characters or icons and the compiled preexisting data;
generating an output representative of all risk quantifiers associated with said security sensitive words, data objects, characters or icons and the compiled preexisting data found in said data by comparing said data to said template.
-
-
53. A method of quantifying the risk of releasing security sensitive words, data objects, characters or icons which may be part of data wherein each one of said security sensitive words, data objects, characters or icons is categorized into one of a plurality of categories, the method comprising:
-
obtaining and compiling preexisting data for each category;
ranking said categories and assigning a rank quantifier to each respective category and to preexisting data subsumed therein;
comparing said data to said preexisting data and generating an output representative of all rank quantifiers associated with preexisting data found therein. - View Dependent Claims (54, 55, 56, 57, 58, 59, 60, 61, 62, 63, 64, 65, 66, 67, 68)
-
-
69. A computerized method of quantifying the risk of releasing security sensitive words, data objects, characters or icons which may be part of data in a computer system wherein each one of said security sensitive words, data objects, characters or icons is categorized into one of a plurality of categories, the method comprising:
-
obtaining and compiling preexisting data for each category;
ranking said categories and assigning a rank quantifier to each respective category and to preexisting data subsumed therein;
comparing said data to said preexisting data and generating an output representative of all rank quantifiers associated with preexisting data found therein. - View Dependent Claims (70, 71, 72, 73, 74, 75, 76, 77, 78, 79, 80, 81, 82, 83, 84)
-
-
85. A computerized method of quantifying the risk of releasing security sensitive words, data objects, characters or icons which may be part of data, the method deployed in a client-server computer system with at least one server computer operatively coupled to at least one client computer over a communications network comprising:
-
categorizing each one of said security sensitive words, data objects, characters or icons into one of a plurality of categories on said at least one server computer;
obtaining and compiling preexisting data for each category via said at least one server computer;
ranking said categories and assigning a rank quantifier to each respective category and preexisting data subsumed therein via said at least one server computer;
comparing said data to said preexisting data and generating an output representative of all rank quantifiers associated with preexisting data found therein in an exchange between said at least one server computer and said at least one client computer. - View Dependent Claims (86, 87, 88, 89, 90, 91, 92, 93, 94, 95, 96, 97, 98)
-
-
99. A computerized method of quantifying the risk of releasing security sensitive words, data objects, characters or icons which may be part of data, the method deployed in a client-sever computer system with at least one server computer operatively coupled to at least one client computer over a communications network comprising:
-
categorizing said security sensitive words, data objects, characters or icons into one of a plurality of categories on said at least one server computer;
obtaining and compiling preexisting data for each category via said at least one server computer;
ranking said categories with respect to each other via said at least one server computer;
assigning a rank quantifier to each respective category and associating the assigned rank quantifier to preexisting data subsumed in each category via said at least one server computer;
forming a template which includes said security sensitive words, data objects, characters or icons and the compiled preexisting data at server; and
generating an output representative of all rank quantifiers associated with security sensitive words, data objects, characters or icons and preexisting data found in said data by comparing said data to said template either during an in an exchange between said at least one server computer and said at least one client computer or via a download from said at least one server computer to said at least one client computer. - View Dependent Claims (100)
-
-
101. A computerized method of quantifying the risk of releasing security sensitive words, data objects, characters or icons which may be part of data, the method deployed in a client-server computer system with at least one server computer operatively coupled to at least one client computer over a communication network comprising:
-
compiling said security sensitive words, data objects, characters or icons;
associating a respective categorical identifier with each of said security sensitive words, data objects, characters or icons;
subdividing, if necessary, each respective categorical identifier into subcategories;
compiling preexisting data per categorical identifier and subcategory;
ranking said categorical identifiers and, if necessary, said subcategories, with respect to each other, and assigning a rank quantifier to each respective categorical identifiers and subcategory and to said preexisting data compiled for each categorical identifier and subcategory and said security sensitive words, data objects, characters or icons;
forming a template which includes said security sensitive words, data objects, characters or icons and the compiled preexisting data;
the steps of compiling, associating, subdividing, compiling preexisting data, ranking and forming said template carried out on said at least one server computer;
generating an output, directed at said at least one client computer, representative of all risk quantifiers associated with said security sensitive words, data objects, characters or icons and the compiled preexisting data found in said data by comparing said data to said template.
-
-
102. A server-based computerized method of quantifying the risk of releasing security sensitive words, data objects, characters or icons which may be part of data, the method deployed in a client-server computer system with at least one server computer operatively coupled to at least one client computer over a communications network comprising:
-
categorizing each one of said security sensitive words, data objects, characters or icons into one of a plurality of categories on said at least one server computer;
obtaining and compiling preexisting data for each category via said at least one server computer;
ranking said categories and assigning a rank quantifier to each respective category and preexisting data subsumed therein via said at least one server computer;
comparing said data to said preexisting data and generating an output, directed at said at least one client computer, representative of all rank quantifiers associated with preexisting data found therein. - View Dependent Claims (103, 104, 105, 106, 107, 108, 109, 110, 111, 112, 113, 114, 115)
-
-
116. A computer readable medium containing programming instructions for quantifying the risk of releasing security sensitive words, data objects, characters or icons which may be part of data, the programming instructions comprising:
-
categorizing each one of said security sensitive words, data objects, characters or icons into one of a plurality of categories;
obtaining and compiling preexisting data for each category;
ranking said categories and assigning a rank quantifier to each respective category and preexisting data subsumed therein;
comparing said data to said preexisting data and generating an output representative of all rank quantifiers associated with preexisting data found therein. - View Dependent Claims (117, 118, 119, 120, 121, 122, 123, 124, 125, 126, 127, 128, 129, 130, 131, 132, 133, 134, 135, 136, 137, 138, 139)
-
-
140. A computer readable medium containing programming instructions for quantifying the risk of releasing security sensitive words, data objects, characters or icons which may be part of data, the programming instructions comprising:
-
categorizing said security sensitive words, data objects, characters or icons into one of a plurality of categories;
obtaining and compiling preexisting data for each category;
ranking said categories with respect to each other;
assigning a rank quantifier to each respective category and associating the assigned rank quantifier to preexisting data subsumed in each category;
forming a template which includes said security sensitive words, data objects, characters or icons and the compiled preexisting data; and
generating an output representative of all rank quantifiers associated with security sensitive words, data objects, characters or icons and preexisting data found in said data by comparing said data to said template.
-
-
141. A computer readable medium containing programming instructions for quantifying the risk of releasing security sensitive words, data objects, characters or icons which may be part of data, the programming instructions comprising:
-
compiling said security sensitive words, data objects, characters or icons;
associating a respective categorical identifier with each of said security sensitive words, data objects, characters or icons;
subdividing, if necessary, each respective categorical identifier into subcategories;
compiling preexisting data per categorical identifier and subcategory;
ranking said categorical identifiers and, if necessary, said subcategories, with respect to each other, and assigning a rank quantifier to each respective categorical identifiers and subcategory and to said preexisting data compiled for each categorical identifier and subcategory and said security sensitive words, data objects, characters or icons;
forming a template which includes said security sensitive words, data objects, characters or icons and the compiled preexisting data;
generating an output representative of all risk quantifiers associated with said security sensitive words, data objects, characters or icons and the compiled preexisting data found in said data by comparing said data to said template.
-
Specification