×

Privacy protection during insider threat monitoring

  • US 10,733,323 B2
  • Filed: 03/29/2019
  • Issued: 08/04/2020
  • Est. Priority Date: 07/26/2017
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implementable method for performing a privacy operation, comprising:

  • monitoring user behavior via an Input/output collector, the Input/output collector capturing user/device interactions between a user and a device, the Input/output collector comprising a keystroke collector, the monitoring comprising collecting keystrokes resulting from user/device interactions;

    determining whether the keystrokes resulting from the user/device interactions include sensitive personal information;

    obfuscating the sensitive personal information, the obfuscating preventing viewing of the sensitive personal information;

    storing sensitive personal information that has been obfuscated within an obfuscated sensitive personal information repository; and

    ,allowing access to the sensitive personal information stored within the obfuscated sensitive personal information repository only when a security administrator is authorized to access the sensitive personal information, the allowing access only when the security administrator is authorized providing conditional sensitive personal information access, authorization to access the sensitive personal information being provided via a superior of the administrator, access to the sensitive personal information being via a security analytics system, the security analytics system executing on a hardware processor of an information handling system.

View all claims
  • 6 Assignments
Timeline View
Assignment View
    ×
    ×