Privacy protection during insider threat monitoring
First Claim
1. A computer-implementable method for performing a privacy operation, comprising:
- monitoring user behavior via an Input/output collector, the Input/output collector capturing user/device interactions between a user and a device, the Input/output collector comprising a keystroke collector, the monitoring comprising collecting keystrokes resulting from user/device interactions;
determining whether the keystrokes resulting from the user/device interactions include sensitive personal information;
obfuscating the sensitive personal information, the obfuscating preventing viewing of the sensitive personal information;
storing sensitive personal information that has been obfuscated within an obfuscated sensitive personal information repository; and
,allowing access to the sensitive personal information stored within the obfuscated sensitive personal information repository only when a security administrator is authorized to access the sensitive personal information, the allowing access only when the security administrator is authorized providing conditional sensitive personal information access, authorization to access the sensitive personal information being provided via a superior of the administrator, access to the sensitive personal information being via a security analytics system, the security analytics system executing on a hardware processor of an information handling system.
6 Assignments
0 Petitions
Accused Products
Abstract
A method, system and computer-usable medium are disclosed for performing a privacy operation, comprising: monitoring user behavior via an Input/output collector, the Input/output collector capturing user/device interactions between a user and a device; determining whether the user/device interactions include sensitive personal information; obfuscating the sensitive personal information, the obfuscating preventing viewing of the sensitive personal information; storing obfuscated sensitive personal information within an obfuscated sensitive personal information repository; and, allowing access to the obfuscated sensitive personal information stored within the obfuscated sensitive personal information repository only when an administrator is authorized to access the obfuscated sensitive personal information so as to provide conditional sensitive personal information access.
99 Citations
20 Claims
-
1. A computer-implementable method for performing a privacy operation, comprising:
-
monitoring user behavior via an Input/output collector, the Input/output collector capturing user/device interactions between a user and a device, the Input/output collector comprising a keystroke collector, the monitoring comprising collecting keystrokes resulting from user/device interactions; determining whether the keystrokes resulting from the user/device interactions include sensitive personal information; obfuscating the sensitive personal information, the obfuscating preventing viewing of the sensitive personal information; storing sensitive personal information that has been obfuscated within an obfuscated sensitive personal information repository; and
,allowing access to the sensitive personal information stored within the obfuscated sensitive personal information repository only when a security administrator is authorized to access the sensitive personal information, the allowing access only when the security administrator is authorized providing conditional sensitive personal information access, authorization to access the sensitive personal information being provided via a superior of the administrator, access to the sensitive personal information being via a security analytics system, the security analytics system executing on a hardware processor of an information handling system. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A system comprising:
-
a processor; a data bus coupled to the processor; and a non-transitory, computer-readable storage medium embodying computer program code, the non-transitory, computer-readable storage medium being coupled to the data bus, the computer program code interacting with a plurality of computer operations and comprising instructions executable by the processor and configured for; monitoring user behavior via an Input/output collector, the Input/output collector capturing user/device interactions between a user and a device, the Input/output collector comprising a keystroke collector, the monitoring comprising collecting keystrokes resulting from user/device interactions; determining whether the keystrokes resulting from the user/device interactions include sensitive personal information; obfuscating the sensitive personal information, the obfuscating preventing viewing of the sensitive personal information; storing sensitive personal information that has been obfuscated within an obfuscated sensitive personal information repository; and
,allowing access to the sensitive personal information stored within the obfuscated sensitive personal information repository only when a security administrator is authorized to access the sensitive personal information, the allowing access only when the security administrator is authorized providing conditional sensitive personal information access, authorization to access the sensitive personal information being provided via a superior of the administrator, access to the sensitive personal information being via a security analytics system, the security analytics system executing on a hardware processor of an information handling system. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A non-transitory, computer-readable storage medium embodying computer program code, the computer program code comprising computer executable instructions configured for:
-
monitoring user behavior via an Input/output collector, the Input/output collector capturing user/device interactions between a user and a device, the Input/output collector comprising a keystroke collector, the monitoring comprising collecting keystrokes resulting from user/device interactions; determining whether the keystrokes resulting from the user/device interactions include sensitive personal information; obfuscating the sensitive personal information, the obfuscating preventing viewing of the sensitive personal information; storing sensitive personal information that has been obfuscated within an obfuscated sensitive personal information repository; and
,allowing access to the sensitive personal information stored within the obfuscated sensitive personal information repository only when a security administrator is authorized to access the sensitive personal information, the allowing access only when the security administrator is authorized providing conditional sensitive personal information access, authorization to access the sensitive personal information being provided via a superior of the administrator, access to the sensitive personal information being via a security analytics system, the security analytics system executing on a hardware processor of an information handling system. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20)
-
Specification