DETECTING DATA BREACHES
First Claim
1. A method for detecting data breaches, the method comprising:
- receiving, from each of a plurality of data owners, a first cryptographically secure representation of data to be monitored for data breaches, each first cryptographically secure representation including a cryptographically secure data structure that represents a plurality of first data records maintained by the data owner;
receiving, from a user and for each of a plurality of second data records, one or more second cryptographically secure representations of the second data records;
determining a number of the second cryptographically secure representations that match a corresponding portion of the first cryptographically secure representation received from a data owner of the plurality of data owners; and
determining that a data breach occurred for the data owner based on the number of the second cryptographically secure representations that match the corresponding portion of the first cryptographically secure representation received from the data owner.
3 Assignments
0 Petitions
Accused Products
Abstract
The subject matter of this specification generally relates to data security. In some implementations, a method includes receiving, from data owners, a first cryptographically secure representation of data to be monitored for data breaches. Each first cryptographically secure representation can include a cryptographically secure data structure that represents a plurality of first data records maintained by the data owner. One or more second cryptographically secure representations of second data records are received from a user. A number of the second cryptographically secure representations that match a corresponding portion of the first cryptographically secure representation received from a data owner is determined. A determination is made that a data breach occurred for the data owner based on the number of the second cryptographically secure representations that match the corresponding portion of the first cryptographically secure representation received from the data owner.
9 Citations
20 Claims
-
1. A method for detecting data breaches, the method comprising:
-
receiving, from each of a plurality of data owners, a first cryptographically secure representation of data to be monitored for data breaches, each first cryptographically secure representation including a cryptographically secure data structure that represents a plurality of first data records maintained by the data owner; receiving, from a user and for each of a plurality of second data records, one or more second cryptographically secure representations of the second data records; determining a number of the second cryptographically secure representations that match a corresponding portion of the first cryptographically secure representation received from a data owner of the plurality of data owners; and determining that a data breach occurred for the data owner based on the number of the second cryptographically secure representations that match the corresponding portion of the first cryptographically secure representation received from the data owner. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A system comprising:
-
a data processing apparatus; and a computer storage medium encoded with a computer program, the program comprising data processing apparatus instructions that when executed by the data processing apparatus cause the data processing apparatus to perform operations comprising; receiving, from each of a plurality of data owners, a first cryptographically secure representation of data to be monitored for data breaches, each first cryptographically secure representation including a cryptographically secure data structure that represents a plurality of first data records maintained by the data owner; receiving, from a user and for each of a plurality of second data records, one or more second cryptographically secure representations of the second data records; determining a number of the second cryptographically secure representations that match a corresponding portion of the first cryptographically secure representation received from a data owner of the plurality of data owners; and determining that a data breach occurred for the data owner based on the number of the second cryptographically secure representations that match the corresponding portion of the first cryptographically secure representation received from the data owner. - View Dependent Claims (14, 15, 16, 17)
-
-
18. A method for detecting data breaches, the method comprising:
-
receiving, from a plurality of data owners, first cryptographically secure representations of data to be monitored for data breaches, each first cryptographically secure representation including a cryptographically secure data structure that represents a plurality of first data records maintained by the data owner; receiving, from a user, a plurality of second data records; generating, for each second data record received from the user, one or more second cryptographically secure representations of the second data record; determining a number of the second cryptographically secure representations that match a corresponding portion of the first cryptographically secure representation received from a data owner of the plurality of data owners; and determining that a data breach occurred for the data owner based on the number of the second cryptographically secure representations that match the corresponding portion of the first cryptographically secure representation received from the data owner. - View Dependent Claims (19, 20)
-
Specification