×

Reducing access to sensitive information

  • US 7,941,859 B2
  • Filed: 06/23/2004
  • Issued: 05/10/2011
  • Est. Priority Date: 06/23/2004
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method for reducing access to sensitive information, comprising:

  • identifying processes and data associated with a computer system;

    classifying each of said data as one of sensitive information and non-sensitive information;

    wherein said sensitive information includes at least one of;

    data that is personal to an individual;

    confidential data; and

    data that is subject to conditions of restricted use;

    for each of said processes;

    selecting a process and a sensitive data item;

    modifying said sensitive data item to form a modified data item each time the selected process accesses the sensitive data;

    analyzing behavior of at least said selected process;

    preventing access to said sensitive data item by said selected process if, as a result of said analyzing, said sensitive data item is determined not to be needed by said selected process, wherein said preventing access includes substituting a value of said sensitive data item with an alternate data value whenever said selected process requests access to said sensitive data item, and wherein if said selected process does not have changeable code, said substituting a value of said sensitive data item with an alternate data value is performed by inserting a replacement layer between said sensitive data item and said selected process,wherein said substituting a value of said sensitive date item is performed by;

    randomly generating said alternate data value;

    mapping said alternate data value to said sensitive data item; and

    storing mapped alternate data value and corresponding sensitive data item in a table within said replacement layer, said table being accessible to saidselected process; and

    minimizing access to sensitive information by transforming a process P into a process P′

    such that P′

    is limited to receiving less personal information than P when it has been determined that P does not require extensive personal information.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×