WO2023160776A3 - Controller and method for finding data to be protected in database - Google Patents

Controller and method for finding data to be protected in database Download PDF

Info

Publication number
WO2023160776A3
WO2023160776A3 PCT/EP2022/054513 EP2022054513W WO2023160776A3 WO 2023160776 A3 WO2023160776 A3 WO 2023160776A3 EP 2022054513 W EP2022054513 W EP 2022054513W WO 2023160776 A3 WO2023160776 A3 WO 2023160776A3
Authority
WO
WIPO (PCT)
Prior art keywords
data
controller
classification
sensitive
protected
Prior art date
Application number
PCT/EP2022/054513
Other languages
French (fr)
Other versions
WO2023160776A2 (en
Inventor
Avi Kessel
Shay Akirav
Ido SHLOMO
Original Assignee
Huawei Technologies Co., Ltd.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co., Ltd. filed Critical Huawei Technologies Co., Ltd.
Priority to PCT/EP2022/054513 priority Critical patent/WO2023160776A2/en
Publication of WO2023160776A2 publication Critical patent/WO2023160776A2/en
Publication of WO2023160776A3 publication Critical patent/WO2023160776A3/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes

Landscapes

  • Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Databases & Information Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Medical Informatics (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Storage Device Security (AREA)

Abstract

A controller for finding data to be protected in a database is configured to receive data includes one or more data segments and determines which data segments to protect by applying pattern classification, metadata classification, and data classification. Further, the controller labels the data segment to be protected as sensitive and protects the data segment by applying security policies. The controller is configured to classify the data in a data segment based on at least a partial address, names of persons, file type classification, face detection, and encrypted and/or random content. By virtue of finding sensitive data and then the classification of the sensitive data enables the controller to perform security policies on the sensitive data to protect the sensitive data. As a result, the controller is beneficial to reduce the number of false positives and false negatives and provides a more accurate classification of sensitive data.
PCT/EP2022/054513 2022-02-23 2022-02-23 Controller and method for finding data to be protected in database WO2023160776A2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/EP2022/054513 WO2023160776A2 (en) 2022-02-23 2022-02-23 Controller and method for finding data to be protected in database

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/EP2022/054513 WO2023160776A2 (en) 2022-02-23 2022-02-23 Controller and method for finding data to be protected in database

Publications (2)

Publication Number Publication Date
WO2023160776A2 WO2023160776A2 (en) 2023-08-31
WO2023160776A3 true WO2023160776A3 (en) 2023-11-16

Family

ID=80933470

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/EP2022/054513 WO2023160776A2 (en) 2022-02-23 2022-02-23 Controller and method for finding data to be protected in database

Country Status (1)

Country Link
WO (1) WO2023160776A2 (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180232528A1 (en) * 2017-02-13 2018-08-16 Protegrity Corporation Sensitive Data Classification
EP3726414A1 (en) * 2019-04-16 2020-10-21 3M Innovative Properties Company System and methods for natural pseudonymization of text
US20200394327A1 (en) * 2019-06-13 2020-12-17 International Business Machines Corporation Data security compliance for mobile device applications
US20210256160A1 (en) * 2020-02-19 2021-08-19 Harrison-Ai Pty Ltd Method and system for automated text anonymisation

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180232528A1 (en) * 2017-02-13 2018-08-16 Protegrity Corporation Sensitive Data Classification
EP3726414A1 (en) * 2019-04-16 2020-10-21 3M Innovative Properties Company System and methods for natural pseudonymization of text
US20200394327A1 (en) * 2019-06-13 2020-12-17 International Business Machines Corporation Data security compliance for mobile device applications
US20210256160A1 (en) * 2020-02-19 2021-08-19 Harrison-Ai Pty Ltd Method and system for automated text anonymisation

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
SAHA AAKANKSHA ET AL: "Secrets in Source Code: Reducing False Positives using Machine Learning", 2020 INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS & NETWORKS (COMSNETS), IEEE, 7 January 2020 (2020-01-07), pages 168 - 175, XP033731545, DOI: 10.1109/COMSNETS48256.2020.9027350 *

Also Published As

Publication number Publication date
WO2023160776A2 (en) 2023-08-31

Similar Documents

Publication Publication Date Title
US20220405522A1 (en) Method for protecting the intellectual property rights of a trained machine learning network model using digital watermarking by adding, on purpose, an anomaly to the training data
EP3812988A1 (en) Method for training and testing adaption network corresponding to obfuscation network capable of processing data to be concealed for privacy, and training device and testing device using the same
CN111538963A (en) Block chain copyright protection system and method based on double chains
AU2015383137B2 (en) Methods and a computing device for determining whether a mark is genuine
KR860006731A (en) How to protect data processing system and its system files
CN104077522A (en) Process integrity detection method of operation system
US8272051B1 (en) Method and apparatus of information leakage prevention for database tables
Solovyev Long-term digital documents storage technology
Karthikeyan et al. Strategy of Trible–E on Solving Trojan Defense in Cyber Crime Cases
CN110598397A (en) Deep learning-based Unix system user malicious operation detection method
WO2023160776A3 (en) Controller and method for finding data to be protected in database
CN111695498B (en) Wood identity detection method
Abdulqader et al. Detection of tamper forgery image in security digital mage
Gafny et al. Poster: applying unsupervised context-based analysis for detecting unauthorized data disclosure
CN105844154B (en) A kind of rogue program detection method based on internal honey jar
Zhou et al. A novel signature based on the combination of global and local signatures for image copy detection
Wilkinson Artificial intelligence, facial recognition technology and data privacy
CN115859289A (en) Lesovirus isolation method based on trusted process tree
CN115659324A (en) Multi-device security management method and system for data security
Liu et al. Terminator: a data-level hybrid framework for intellectual property theft detection and prevention
RU2272319C2 (en) Method for protecting individual label marking of serial product with utilization of interactive electronic database
Ketley Case study: Code of ethics for facial recognition technology
Liu et al. A sensitive file abnormal access detection method based on application classification
CN110851864A (en) Sensitive data automatic identification and processing method and system
Atkinson et al. Myth 15: Facial Recognition Is Inherently Biased

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22712298

Country of ref document: EP

Kind code of ref document: A2