METHOD AND SYSTEM FOR DIGITAL PRIVACY MANAGEMENT
First Claim
Patent Images
1. A system for managing data privacy, comprising:
- a processor; and
a memory, the memory having stored therein;
at least one security module for provision of at least one data privacy measure for protection of data;
a security risk controller for dynamically modifying security policies, which, when executed by the processor, performs operations of;
receiving context data from said at least one security module;
determining, in real time, at least one internal security risk factor from the context data; and
responsive to said determining, modifying, in real time, a security policy for the at least one data privacy measure;
the memory having further stored therein;
a fraud predictor for identifying and reporting users at risk for engaging in malicious behavior, which when executed by the processor performs operations of;
receiving a plurality of inputs regarding user behavior; and
analyzing the inputs to identify authorized users/applicationsdisplaying anomalous behavior that indicates a malicious propensity;
wherein role-based, need-to-know access is granted only to specific users or groups of users or applications for ensuring data protection; and
wherein the system is capable of managing the at least one data privacy measure without requiring code changes and without requiring users to modify their computing behavior.
0 Assignments
0 Petitions
Accused Products
Abstract
Data Privacy Manager (DPM) solution includes a number of different components performing data security procedures (encryption, masking, tokenization, Anonymization, etc.) at the folder, file, email, application, database and column levels. These include components such as Key Manager, File Manager, File Agent, Email Agent, Database Manager, Database Connector, the Token Manager, Security Risk Controller and Fraud Predictor. All these components can be managed through a management console.
-
Citations
20 Claims
-
1. A system for managing data privacy, comprising:
-
a processor; and a memory, the memory having stored therein; at least one security module for provision of at least one data privacy measure for protection of data; a security risk controller for dynamically modifying security policies, which, when executed by the processor, performs operations of; receiving context data from said at least one security module; determining, in real time, at least one internal security risk factor from the context data; and responsive to said determining, modifying, in real time, a security policy for the at least one data privacy measure; the memory having further stored therein; a fraud predictor for identifying and reporting users at risk for engaging in malicious behavior, which when executed by the processor performs operations of; receiving a plurality of inputs regarding user behavior; and analyzing the inputs to identify authorized users/applications displaying anomalous behavior that indicates a malicious propensity; wherein role-based, need-to-know access is granted only to specific users or groups of users or applications for ensuring data protection; and wherein the system is capable of managing the at least one data privacy measure without requiring code changes and without requiring users to modify their computing behavior. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A computer-implemented method for managing data privacy without requiring code changes and without requiring users to modify their computing behavior comprising:
-
at least one security module collecting context data regarding at least one privacy measure for protection of data; a security risk controller receiving said context data responsive to transmission thereto by said at least one security module; the security risk controller determining, in real time, at least one internal security risk factor from the context data; and responsive to said determining, modifying, in real time, a security policy for the at least one data privacy measure; a fraud predictor receiving a plurality of inputs regarding user behavior; analyzing the inputs to identify authorized users/applications displaying anomalous behavior that indicates a malicious propensity; identifying and reporting users at risk for engaging in malicious behavior; and granting access only to specific users or groups of users or applications for ensuring data protection based on said internal risk factor and output of said fraud predictor.
-
-
20. A non-transitory computer-readable medium storing instructions, wherein the instructions, when executed by a computer system, cause the computer system to perform a method, the method comprising:
-
at least one security module collecting context data regarding at least one privacy measure for protection of data; a security risk controller receiving said context data responsive to transmission thereto by said at least one security module; the security risk controller determining, in real time, at least one internal security risk factor from the context data; and responsive to said determining, modifying, in real time, a security policy for the at least one data privacy measure; a fraud predictor receiving a plurality of inputs regarding user behavior; analyzing the inputs to identify authorized users/applications displaying anomalous behavior that indicates a malicious propensity; identifying and reporting users at risk for engaging in malicious behavior; and granting access only to specific users or groups of users or applications for ensuring data protection based on said internal risk factor and output of said fraud predictor.
-
Specification