×

Privacy protection during insider threat monitoring

  • US 10,262,153 B2
  • Filed: 11/17/2017
  • Issued: 04/16/2019
  • Est. Priority Date: 07/26/2017
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implementable method for performing a privacy operation, comprising:

  • monitoring user behavior via an Input/output collector, the Input/output collector capturing user/device interactions between a user and a device, the Input/output collector capturing the user/device interactions through the use of at least one of an electronic device, a computer system comprising a hardware processor and a software application executing on the hardware processor of the computer system;

    determining whether the user/device interactions include sensitive personal information;

    obfuscating the sensitive personal information, the obfuscating preventing viewing of the sensitive personal information;

    storing sensitive personal information that has been obfuscated within an obfuscated sensitive personal information repository, the sensitive personal information being stored via a one-way function, the one-way function preventing access to the sensitive personal information unless access to the sensitive personal information is authorized; and

    ,allowing access to the sensitive personal information stored within the obfuscated sensitive personal information repository only when a security administrator is authorized to access the sensitive personal information, the allowing access only when the security administrator is authorized providing conditional sensitive personal information access, authorization to access the sensitive personal information being provided via a superior of the administrator, access to the sensitive personal information being via a security analytics system.

View all claims
  • 8 Assignments
Timeline View
Assignment View
    ×
    ×