MODEL-BASED SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR DETECTING AT LEAST POTENTIALLY UNWANTED ACTIVITY ASSOCIATED WITH CONFIDENTIAL DATA
First Claim
Patent Images
1. A computer program product embodied on a non-transitory computer readable medium, comprising instructions stored thereon to cause a processor to:
- detect an attempt by a user to access confidential data stored on an electronic device;
identify behavioral information associated with the user'"'"'s interaction with the confidential data according to one or more predetermined parameters, each of the predetermined parameters representing a type of interaction with the confidential data;
create a model utilizing the behavioral information;
compare the model with one or more predefined models representative of known unwanted activity; and
detect at least potentially unwanted activity associated with the confidential data based on the comparison.
10 Assignments
0 Petitions
Accused Products
Abstract
A model-based system, method, and computer program product are provided for detecting at least potentially unwanted activity associated with confidential data. In use, behavior information associated with use of confidential data is identified, based on predetermined parameters. Additionally, a model is created utilizing the behavioral information. Furthermore, at least potentially unwanted activity associated with the confidential data is detected utilizing the model.
-
Citations
20 Claims
-
1. A computer program product embodied on a non-transitory computer readable medium, comprising instructions stored thereon to cause a processor to:
-
detect an attempt by a user to access confidential data stored on an electronic device; identify behavioral information associated with the user'"'"'s interaction with the confidential data according to one or more predetermined parameters, each of the predetermined parameters representing a type of interaction with the confidential data; create a model utilizing the behavioral information; compare the model with one or more predefined models representative of known unwanted activity; and detect at least potentially unwanted activity associated with the confidential data based on the comparison. - View Dependent Claims (3, 4, 5, 7, 8, 9, 10, 12, 13, 14, 15, 16, 17)
-
-
2. (canceled)
-
6. (canceled)
-
11. (canceled)
-
18. A method, comprising:
-
detecting, utilizing one or more processors, an attempt by a user to access confidential data stored on an electronic device; identifying, utilizing the one or more processors, behavioral information associated with the user'"'"'s interaction with the confidential data according to one or more predetermined parameters, each of the one or more predetermined parameters representing a type of interaction with the confidential data; creating, utilizing the one or more processors, a model utilizing the behavioral information; comparing, utilizing the one or more processors, the model with one or more predefined models representative of known unwanted activity; and detecting, utilizing the one or more processors, at least potentially unwanted activity associated with the confidential data based on the comparison.
-
-
19. A system, comprising:
-
a memory; and a processor operatively coupled to the memory, the processor adapted to execute program code stored in the memory to; detect an attempt by a user to access confidential data stored on an electronic device; identify behavioral information associated with the user'"'"'s interaction with the confidential data according to one or more predetermined parameters, each of the one or more predetermined parameters representing a type of interaction with the confidential data; create a model utilizing the behavioral information; compare the model with one or more predefined models representative of known unwanted activity; and detect at least potentially unwanted activity associated with the confidential data based on the comparison.
-
-
20. (canceled)
Specification