BEHAVIORAL ENGINE FOR IDENTIFYING PATTERNS OF CONFIDENTIAL DATA USE
First Claim
Patent Images
1. A computer-implemented method comprising:
- analyzing, by a client device, behavior of a client application with respect to confidential information;
assigning a rating indicative of risk to the client application based on the behavior of the client application; and
performing an action to mitigate risk of data loss if the rating exceeds a threshold.
2 Assignments
0 Petitions
Accused Products
Abstract
A client device hosts a behavioral engine. Using the behavioral engine, the client device analyzes behavior of a client application with respect to confidential information. The client device assigns a rating indicative of risk to the client application based on the behavior of the client application. The client device performs an action to mitigate risk of data loss if the rating exceeds a threshold.
88 Citations
20 Claims
-
1. A computer-implemented method comprising:
-
analyzing, by a client device, behavior of a client application with respect to confidential information; assigning a rating indicative of risk to the client application based on the behavior of the client application; and performing an action to mitigate risk of data loss if the rating exceeds a threshold. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer-readable storage medium including instructions that, when executed by a processing system, cause the processing system to perform a method comprising:
-
analyzing, by a client device, behavior of a client application with respect to confidential information; assigning a rating indicative of risk to the client application based on the behavior of the client application; and performing an action to mitigate risk of data loss if the rating exceeds a threshold. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A computing apparatus comprising:
-
a memory to store instructions for a behavioral engine; and a processor, connected with the memory, to execute the instructions, wherein the instructions cause the processor to; analyze behavior of a client application with respect to confidential information; assign a rating indicative of risk to the client application based on the behavior of the client application; and perform an action to mitigate risk of data loss if the rating exceeds a threshold. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification