GR1010623B - User's internet protection method via detection of data leaks - Google Patents

User's internet protection method via detection of data leaks Download PDF

Info

Publication number
GR1010623B
GR1010623B GR20230100117A GR20230100117A GR1010623B GR 1010623 B GR1010623 B GR 1010623B GR 20230100117 A GR20230100117 A GR 20230100117A GR 20230100117 A GR20230100117 A GR 20230100117A GR 1010623 B GR1010623 B GR 1010623B
Authority
GR
Greece
Prior art keywords
leaks
internet
data
user
protection method
Prior art date
Application number
GR20230100117A
Other languages
Greek (el)
Inventor
Δαναη Χατζηλακου
Παυλος Πελεκης
Original Assignee
Memorandum Ιδιωτικη Κεφαλαιουχικη Εταιρεια,
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Memorandum Ιδιωτικη Κεφαλαιουχικη Εταιρεια, filed Critical Memorandum Ιδιωτικη Κεφαλαιουχικη Εταιρεια,
Priority to GR20230100117A priority Critical patent/GR1010623B/en
Publication of GR1010623B publication Critical patent/GR1010623B/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F40/00Handling natural language data
    • G06F40/20Natural language analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Computing Systems (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • Databases & Information Systems (AREA)
  • Audiology, Speech & Language Pathology (AREA)
  • Computational Linguistics (AREA)
  • Artificial Intelligence (AREA)
  • Software Systems (AREA)
  • Medical Informatics (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Computer And Data Communications (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The system described herein is a method of protecting Internet users from cyber-attacks that may result from the leakage of their data on the Internet. The above method accepts as input the internet user data (email addresses, phone numbers) and investigates on a continuous basis potential relevant leaks thereof. This method is liable to find new findings, understand which leaks are relevant to the entities under investigation and categorize data leaks by criticality, using machine learning and artificial intelligence algorithms. The formulation and development of this method is a continuous process and, therefore, a team of expert analysts have authorized access to control and evaluate its operation in order to formulate and optimize said method and its components in real time.
GR20230100117A 2023-02-15 2023-02-15 User's internet protection method via detection of data leaks GR1010623B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
GR20230100117A GR1010623B (en) 2023-02-15 2023-02-15 User's internet protection method via detection of data leaks

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GR20230100117A GR1010623B (en) 2023-02-15 2023-02-15 User's internet protection method via detection of data leaks

Publications (1)

Publication Number Publication Date
GR1010623B true GR1010623B (en) 2024-01-30

Family

ID=89983969

Family Applications (1)

Application Number Title Priority Date Filing Date
GR20230100117A GR1010623B (en) 2023-02-15 2023-02-15 User's internet protection method via detection of data leaks

Country Status (1)

Country Link
GR (1) GR1010623B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017115272A1 (en) * 2015-12-28 2017-07-06 Sixgill Ltd. Dark web monitoring, analysis and alert system and method
US20190266355A1 (en) * 2015-12-04 2019-08-29 Early Warning Services, Llc Systems and methods of determining compromised identity information
US20190340390A1 (en) * 2018-05-04 2019-11-07 Rubicon Global Holdings, Llc. Systems and methods for detecting and remedying theft of data
WO2019222224A1 (en) * 2018-05-14 2019-11-21 Guardinex LLC Dynamic risk detection and mitigation of compromised customer log-in credentials
US20200137109A1 (en) * 2018-10-31 2020-04-30 SpyCloud, Inc. Detecting Use of Compromised Security Credentials in Private Enterprise Networks
US20220004630A1 (en) * 2020-07-01 2022-01-06 Cyber Reconaissance, Inc. Systems and methods for a multi-model approach to predicting the development of cyber threats to technology products

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20190266355A1 (en) * 2015-12-04 2019-08-29 Early Warning Services, Llc Systems and methods of determining compromised identity information
WO2017115272A1 (en) * 2015-12-28 2017-07-06 Sixgill Ltd. Dark web monitoring, analysis and alert system and method
US20190340390A1 (en) * 2018-05-04 2019-11-07 Rubicon Global Holdings, Llc. Systems and methods for detecting and remedying theft of data
WO2019222224A1 (en) * 2018-05-14 2019-11-21 Guardinex LLC Dynamic risk detection and mitigation of compromised customer log-in credentials
US20200137109A1 (en) * 2018-10-31 2020-04-30 SpyCloud, Inc. Detecting Use of Compromised Security Credentials in Private Enterprise Networks
US20220004630A1 (en) * 2020-07-01 2022-01-06 Cyber Reconaissance, Inc. Systems and methods for a multi-model approach to predicting the development of cyber threats to technology products

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
XP033005748 *

Similar Documents

Publication Publication Date Title
Liu et al. Rethinking machine unlearning for large language models
Carpenter et al. Refining technology threat avoidance theory
Taneja et al. Testing software in age of data privacy: A balancing act
Chalhoub et al. Factoring user experience into the security and privacy design of smart home devices: A case study
Yan et al. On protecting the data privacy of large language models (llms): A survey
Tan et al. Understanding negotiated anti-malware interruption effects on user decision quality in endpoint security
Ivić et al. The Challenges and Opportunities in Adopting AI, IoT and Blockchain Technology in E-Government: A Systematic Literature Review
Mireshghallah et al. A principled approach to learning stochastic representations for privacy in deep neural inference
Jimenez et al. Carets: A consistency and robustness evaluative test suite for vqa
Addington ChatGPT: cyber security threats and countermeasures
Li et al. Unit selection with nonbinary treatment and effect
GR1010623B (en) User's internet protection method via detection of data leaks
Hu et al. Shield Against Gradient Leakage Attacks: Adaptive Privacy-Preserving Federated Learning
Xiong et al. Generating realistic fake equations in order to reduce intellectual property theft
Vaczi et al. Fuzzy-based cybersecurity risk analysis of the human factor from the perspective of classified information leakage
De Cristofaro Synthetic Data: Methods, Use Cases, and Risks
Seeman Framing Effects in the Operationalization of Differential Privacy Systems as Code-Driven Law
Gao et al. Ethos: Rectifying language models in orthogonal parameter space
Huang Defense against membership inference attack applying domain adaptation with addictive noise
Rao et al. Privacy inference attack and defense in centralized and federated learning: A comprehensive survey
Derbyshire Anticipating Adversary Cost: Bridging the Threat-Vulnerability Gap in Cyber Risk Assessment
Herurkar et al. Cross-Domain Transformation for Outlier Detection on Tabular Datasets
CN112861179A (en) Method for desensitizing personal digital spatial data based on text-generated countermeasure network
Fazelnia et al. Supporting Artificial Intelligence/Machine Learning Security Workers Through an Adversarial Techniques, Tools, and Common Knowledge Framework
Jiang et al. Differential Privacy on Edge Computing

Legal Events

Date Code Title Description
PG Patent granted

Effective date: 20240209