SYSTEM AND METHOD FOR SECURING PERSONAL DATA ELEMENTS
First Claim
1. A computer-implemented method of securing data elements, the method comprising:
- obtaining a connection profile, the connection profile including at least one rule related to at least one personally identifiable information (PII) data element;
associating the connection profile with a network connection;
receiving a data unit transmitted over the network connection, the data unit including at least a portion of the PII data element; and
based on the rule, performing at least one of;
blocking transmission of the data unit, modifying the data unit, forwarding at least a portion of the data unit to a selected destination, storing the data unit, storing metadata related to the data unit, and reporting an event related to the data unit.
2 Assignments
0 Petitions
Accused Products
Abstract
A system and method may obtain a connection profile, the connection profile including at least one rule related to at least one PII data element; associate the connection profile with a network connection; receive a data unit transmitted over the network connection, the data unit including at least a portion of the PII data element; and, based on the rule, perform at least one of: blocking transmission of the data unit, modifying the data unit, forwarding at least a portion of the data unit to a selected destination, storing the data unit, storing metadata related to the data unit, and reporting an event related to the data unit. A system and method may associate the connection profile with a set of connection. A system and method may automatically modify a set of connection profiles based on an event.
25 Citations
27 Claims
-
1. A computer-implemented method of securing data elements, the method comprising:
-
obtaining a connection profile, the connection profile including at least one rule related to at least one personally identifiable information (PII) data element; associating the connection profile with a network connection; receiving a data unit transmitted over the network connection, the data unit including at least a portion of the PII data element; and based on the rule, performing at least one of;
blocking transmission of the data unit, modifying the data unit, forwarding at least a portion of the data unit to a selected destination, storing the data unit, storing metadata related to the data unit, and reporting an event related to the data unit. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A system comprising:
-
a memory; and a controller configured to; obtain a connection profile, the connection profile including at least one rule related to at least one personally identifiable information (PII) data element; associate the connection profile with a network connection; receive a data unit transmitted over the network connection, the data unit including at least a portion of the PII data element; and based on the rule, perform at least one of;
blocking transmission of the data unit, modifying the data unit, forwarding at least a portion of the data unit to a selected destination, storing the data unit, storing metadata related to the data unit, and reporting an event related to the data unit. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26)
-
-
27. A method of managing sharing of personally identifiable information (PII) data elements, the method comprising:
-
associating a connection profile with a network connection, the network connection enabling sharing of PII data elements between a protected system and an external system; intercepting transmission of a PII data element transmitted over the network connection; and based on data in the connection profile, performing at least one of;
blocking transmission of the data unit, modifying the data unit, forwarding at least a portion of the data unit to a selected destination, storing the data unit, storing metadata related to the data unit, and reporting an event related to the data unit.
-
Specification