Confidential data protection through usage scoping
First Claim
1. A computer-implemented method for protecting confidential data, the method executed by a computer and comprising:
- using the computer to monitor data the computer attempts to communicate to a website;
identifying within the monitored data a data string;
categorizing the data string with a description that describes a pattern of previous usage of the data string with other websites;
locating a website characteristic profile for the website, the web site characteristic profile describing a pattern of previous usage of the website;
comparing the website characteristic profile with the data string'"'"'s categorization to determine whether the pattern of previous usage of the data string matches the pattern of previous usage of the website;
responsive to the comparison indicating that the pattern of previous usage of the data string matches the pattern of previous usage of the website, allowing communication of the data string to the website; and
responsive to the comparison indicating that the pattern of previous usage of the data string does not match the pattern of previous usage of the website, blocking communication of the data string to the website.
4 Assignments
0 Petitions
Accused Products
Abstract
Methods, apparatuses, and computer-readable media for protecting confidential data on a network. An embodiment of the inventive method comprises the steps of: monitoring 110 data directed to a website; identifying 120 a data string having at least one confidential characteristic; categorizing the data string with a categorization level; examining 140 the website for at least one characteristic consistent with confidential data; creating 155 a website characteristic profile; comparing 170 the website characteristic profile with the data string'"'"'s categorization level for compatibility; and determining 180 whether the data string can be communicated to the website.
-
Citations
20 Claims
-
1. A computer-implemented method for protecting confidential data, the method executed by a computer and comprising:
-
using the computer to monitor data the computer attempts to communicate to a website; identifying within the monitored data a data string; categorizing the data string with a description that describes a pattern of previous usage of the data string with other websites; locating a website characteristic profile for the website, the web site characteristic profile describing a pattern of previous usage of the website; comparing the website characteristic profile with the data string'"'"'s categorization to determine whether the pattern of previous usage of the data string matches the pattern of previous usage of the website; responsive to the comparison indicating that the pattern of previous usage of the data string matches the pattern of previous usage of the website, allowing communication of the data string to the website; and responsive to the comparison indicating that the pattern of previous usage of the data string does not match the pattern of previous usage of the website, blocking communication of the data string to the website. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. At least one non-transitory computer-readable storage medium containing executable computer program instructions for protecting confidential information, the computer program instructions performing the steps of:
-
monitoring data a computer attempts to communicate to a website; identifying within the monitored data a data string; categorizing the data string with a description that describes a pattern of previous usage of the data string with other websites; locating a website characteristic profile for the website, the web site characteristic profile describing a pattern of previous usage of the website; comparing the website characteristic profile with the data string'"'"'s categorization to determine whether the pattern of previous usage of the data string matches the pattern of previous usage of the website; responsive to the comparison indicating that the pattern of previous usage of the data string matches the pattern of previous usage of the website, allowing communication of the data string to the website; and responsive to the comparison indicating that the pattern of previous usage of the data string does not match the pattern of previous usage of the website, blocking communication of the data string to the website. - View Dependent Claims (17, 18, 19, 20)
-
Specification