WO2010011182A3 - Method and system for tracing a source of leaked information - Google Patents
Method and system for tracing a source of leaked information Download PDFInfo
- Publication number
- WO2010011182A3 WO2010011182A3 PCT/SG2008/000273 SG2008000273W WO2010011182A3 WO 2010011182 A3 WO2010011182 A3 WO 2010011182A3 SG 2008000273 W SG2008000273 W SG 2008000273W WO 2010011182 A3 WO2010011182 A3 WO 2010011182A3
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- identity
- information
- network
- leaked
- employee
- Prior art date
Links
- 230000008520 organization Effects 0.000 abstract 2
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/16—Program or content traceability, e.g. by watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
Abstract
Embodiments of the invention provide a method and a system of tracing a source of leaked information owned by an organization after the information has been leaked on an external network. An identity-relationship database is built, wherein the identity-relationship database contains information linking, either directly or indirectly, an employee of the organization to one or more network identities, and to network identities of others with whom the employee communicates. The leaked information on a site on the external network is located, and a network identity of the poster of the leaked information on the external network is determined. It is determined whether one or more links in the identity-relationship database connect the network identity of the poster of the leaked information to the employee. If the one or more links connect the network identity of the poster of the leaked information to the employee, the employee is identified as a possible source of the leaked information.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/SG2008/000273 WO2010011182A2 (en) | 2008-07-25 | 2008-07-25 | Method and system for tracing a source of leaked information |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/SG2008/000273 WO2010011182A2 (en) | 2008-07-25 | 2008-07-25 | Method and system for tracing a source of leaked information |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2010011182A2 WO2010011182A2 (en) | 2010-01-28 |
WO2010011182A3 true WO2010011182A3 (en) | 2011-02-17 |
Family
ID=41570764
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/SG2008/000273 WO2010011182A2 (en) | 2008-07-25 | 2008-07-25 | Method and system for tracing a source of leaked information |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2010011182A2 (en) |
Families Citing this family (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2505123B (en) * | 2011-05-24 | 2018-12-05 | Avaya Inc | Social media identity discovery and mapping |
US9817899B2 (en) | 2013-08-26 | 2017-11-14 | Globalfoundries | Searching for secret data through an untrusted searcher |
US10152609B2 (en) * | 2015-07-23 | 2018-12-11 | The Boeing Company | Personally identifiable information (PII) disclosure detection |
US11409899B2 (en) | 2016-02-08 | 2022-08-09 | Liveramp, Inc. | Change fingerprinting for database tables, text files, and data feeds |
IT201600119873A1 (en) * | 2016-11-25 | 2018-05-25 | Hornet Tech International S R L | SYSTEM FOR THE PROTECTION OF A INFORMATION NETWORK, IN PARTICULAR OF A BANK FROM ILLEGAL TRANSACTIONS |
CN110120948B (en) * | 2019-05-06 | 2020-12-15 | 四川英得赛克科技有限公司 | Illegal external connection monitoring method based on wireless and wired data stream similarity analysis |
CN111885007B (en) * | 2020-06-30 | 2023-03-24 | 北京长亭未来科技有限公司 | Information tracing method, device, system and storage medium |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2005063276A (en) * | 2003-08-18 | 2005-03-10 | Hitachi Software Eng Co Ltd | Confidential information leakage preventing system |
JP2005122561A (en) * | 2003-10-17 | 2005-05-12 | Canon Inc | Application protect system |
JP2008097420A (en) * | 2006-10-13 | 2008-04-24 | Chugoku Electric Power Co Inc:The | Information management system and information management method |
-
2008
- 2008-07-25 WO PCT/SG2008/000273 patent/WO2010011182A2/en active Application Filing
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2005063276A (en) * | 2003-08-18 | 2005-03-10 | Hitachi Software Eng Co Ltd | Confidential information leakage preventing system |
JP2005122561A (en) * | 2003-10-17 | 2005-05-12 | Canon Inc | Application protect system |
JP2008097420A (en) * | 2006-10-13 | 2008-04-24 | Chugoku Electric Power Co Inc:The | Information management system and information management method |
Also Published As
Publication number | Publication date |
---|---|
WO2010011182A2 (en) | 2010-01-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2010011182A3 (en) | Method and system for tracing a source of leaked information | |
TW200943105A (en) | System and/or method for personalization of searches | |
WO2007127336A3 (en) | Order management for electronic securities trading | |
WO2006033765A3 (en) | Real-time data localization | |
WO2011112492A3 (en) | Systems and methods for protecting consumer privacy in online advertising environments | |
GB201017876D0 (en) | Database systems and methods | |
WO2007148233A3 (en) | Dynamically serving advertisements in an executing computer game | |
HRP20060151A2 (en) | The method of safe certification service | |
WO2009052514A3 (en) | Methods of identifying environmentally friendly businesses or individuals | |
ATE418102T1 (en) | INTELLIGENT DECISION-MAKING SYSTEM TO ENABLE EASY AND SECURE BACKUP STORAGE | |
WO2006091425A3 (en) | Security risk analysis system and method | |
GB2447180A (en) | Property rating and ranking system and method | |
ATE554978T1 (en) | MONITORING DEVICE FOR MONITORING SYSTEMS OF A VEHICLE | |
WO2009054839A3 (en) | Template based matching | |
WO2007112425A3 (en) | Method and system for social and leisure life management | |
WO2008008899A3 (en) | Methods and systems for compliance confirmation and incentives | |
MX2011008220A (en) | Performance management system. | |
WO2007127425A3 (en) | Methods and systems for providing cross-selling with online banking environments | |
WO2009017231A2 (en) | Pattern examination system, pattern examination device, method, and pattern examination program | |
WO2009075554A3 (en) | Patent information providing method and system | |
DK1704485T3 (en) | APPROVAL PROCEDURE | |
ATE504147T1 (en) | METHOD AND COMPUTER READABLE STORAGE MEDIUM FOR PROVIDING SECURE ACCESS BETWEEN DEVICES | |
GB2462774A (en) | Compromised account detection | |
FI20080003A (en) | The method and the party provided with a terminal for warning system | |
WO2009152011A3 (en) | System and method for managing work instructions for vehicles |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 08779500 Country of ref document: EP Kind code of ref document: A2 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 08779500 Country of ref document: EP Kind code of ref document: A2 |