Keyword obfuscation
First Claim
1. A system for monitoring events on a monitored computer, the system comprising:
- a first computer not accessible by a user of the monitored computer, the first computer comprising a processor and a first set of instructions executable by the processor, the first set of instructions comprising;
a) instructions to receive a keyword;
b) instructions to generate a regular expression that is satisfied by the keyword;
c) instructions to generate at least one identifier corresponding to the keyword;
d) instructions to generate a set of one or more one hash values corresponding to the keyword;
e) instructions to create at least one package comprising the identifier and the one or more hash values; and
f) instructions to transmit the regular expression and the package for reception by a software program executing on the monitored computer; and
a software program executing on the monitored computer, the software program comprising a second set of instructions executable by the monitored computer, the second set of instructions comprising;
aa) instructions to receive the regular expression and the package from the first computer;
bb) instructions to identify a set of text at the monitored computer, the set of text being associated with an event;
cc) instructions to evaluate the set of text against the regular expression to determine whether at least a portion of the set of text satisfies the regular expression;
dd) instructions to generate a text hash from the at least a portion of the set of text, based on a determination that the at least a portion of the set of text satisfies the regular expression;
ee) instructions to compare the text hash to at least one of the one or more hash values;
ff) instructions to identify the event as an event requiring monitoring, based on a comparison of the text hash with the at least one hash value.
16 Assignments
0 Petitions
Accused Products
Abstract
Embodiments of the invention provide novel systems, methods and software for searching and/or analyzing text, based on a list of one or more keywords of interest. In a set of embodiments, a first computer generates a regular expression satisfied by a particular keyword of interest as well as a hash value corresponding to the keyword. In some embodiments, the regular expression and the hash value are transmitted to a second computer, which identifies a set of text associated with a particular event and/or evaluates the set of text against the regular expression. If the text satisfies the regular expression, the second computer might generate a text hash from the text. This text hash can be compared with the hash from the package, and if there is a match, the event might be identified as requiring monitoring, collection and/or further analysis.
69 Citations
35 Claims
-
1. A system for monitoring events on a monitored computer, the system comprising:
-
a first computer not accessible by a user of the monitored computer, the first computer comprising a processor and a first set of instructions executable by the processor, the first set of instructions comprising; a) instructions to receive a keyword; b) instructions to generate a regular expression that is satisfied by the keyword; c) instructions to generate at least one identifier corresponding to the keyword; d) instructions to generate a set of one or more one hash values corresponding to the keyword; e) instructions to create at least one package comprising the identifier and the one or more hash values; and f) instructions to transmit the regular expression and the package for reception by a software program executing on the monitored computer; and a software program executing on the monitored computer, the software program comprising a second set of instructions executable by the monitored computer, the second set of instructions comprising; aa) instructions to receive the regular expression and the package from the first computer; bb) instructions to identify a set of text at the monitored computer, the set of text being associated with an event; cc) instructions to evaluate the set of text against the regular expression to determine whether at least a portion of the set of text satisfies the regular expression; dd) instructions to generate a text hash from the at least a portion of the set of text, based on a determination that the at least a portion of the set of text satisfies the regular expression; ee) instructions to compare the text hash to at least one of the one or more hash values; ff) instructions to identify the event as an event requiring monitoring, based on a comparison of the text hash with the at least one hash value. - View Dependent Claims (4, 5, 6, 7, 8)
-
-
2. A system as recited by 1, wherein the system further comprises a monitoring computer in communication with the monitored computer, and wherein the second set of instructions further comprises:
instructions to transmit for reception by the monitoring computer a set of information associated with the event. - View Dependent Claims (3)
-
9. A method of identifying an event on a monitored computer as requiring monitoring, by identifying text associated with the event, the method comprising:
-
receiving, at a computer not accessible by a user of the monitored computer, a keyword; generating, at the computer not accessible by the user of the monitored computer, a regular expression that is satisfied by the keyword; generating, at the computer not accessible by the user of the monitored computer, an identifier corresponding to the keyword; generating, at the computer not accessible by the user of the monitored computer, a set of one or more hash values corresponding to the keyword; transmitting the regular expression, the identifier and the set of one or more hash values for reception by the monitored computer so the regular expression and the set of one or more hash values are available to be used to analyze text at the monitored computer, such that an event associated with text matching the regular expression and at least one of one or more hash values can be identified as requiring monitoring. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23)
-
-
24. A computer system for facilitating the identification of an event on a monitored computer, wherein the computer system is not accessible by a user of the monitored computer, the computer system comprising a processor and a set of instructions executable by the processor, the set of instructions comprising:
-
instructions to receive a plurality of keyword comprising a first keyword and a second keyword; instructions to generate a regular expression that is satisfied by both the first keyword and the second keyword; instructions to generate a first set of one or more hash values corresponding to the first keyword; instructions to generate a second set of one or more hash values corresponding to the second keyword; and instructions to transmit the regular expression, the first set of one or more hash values, and the second set of one or more hash values for reception by the monitored computer so the regular expression and the first and second sets of one or more hash values are available to be used to analyze text at the monitored computer, such that an event associated with text matching (i) the regular expression and (ii) at least one hash value from either the first set of one or more hash values or the second set of one or more hash values can be identified as requiring monitoring.
-
-
25. A method for identifying an event requiring monitoring, the method comprising:
-
receiving at a first computer and from a second computer a package corresponding to a keyword, wherein the second computer is not accessible by a user of the first computer, the package comprising a regular expression that is satisfied by at least a portion of the keyword, an identifier corresponding to the keyword and at least one hash value generated from at least a portion of the keyword; identifying a set of text at the first computer, the set of text being associated with an event; evaluating the set of text against the regular expression to determine whether at least a portion of the set of text satisfies the regular expression; generating a text hash from the at least a portion of the set of text; comparing the text hash to the at least one hash value; and based on a comparison of the text hash with the at least one hash value, identifying the event as an event requiring monitoring. - View Dependent Claims (26, 27, 28, 29, 30, 31)
-
-
32. A computer program embodied in a non-transitory computer readable medium for identifying an event requiring monitoring, the computer program comprising set of instructions executable by a first computer not accessible by a user of a second computer, the set of instructions comprising:
-
instructions to receive from the second computer a package corresponding to a keyword, the package comprising a regular expression that is satisfied by the keyword, an identifier corresponding to the keyword and at least one hash value generated from the keyword; instructions to identify a set of text, the set of text being associated with an event; instructions to evaluate the set of text against the regular expression to determine whether at least a portion of the set of text satisfies the regular expression; instructions to generate a text hash from the at least a portion of the set of text; instructions to compare the text hash to the at least one hash value; instructions to identify the event as an event requiring monitoring, based on a comparison of the text hash with the at least one hash value. - View Dependent Claims (33, 34, 35)
-
Specification