WO2023160776A3 - Controller and method for finding data to be protected in database - Google Patents
Controller and method for finding data to be protected in database Download PDFInfo
- Publication number
- WO2023160776A3 WO2023160776A3 PCT/EP2022/054513 EP2022054513W WO2023160776A3 WO 2023160776 A3 WO2023160776 A3 WO 2023160776A3 EP 2022054513 W EP2022054513 W EP 2022054513W WO 2023160776 A3 WO2023160776 A3 WO 2023160776A3
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- data
- controller
- classification
- sensitive
- protected
- Prior art date
Links
- 230000009286 beneficial effect Effects 0.000 abstract 1
- 238000001514 detection method Methods 0.000 abstract 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
Landscapes
- Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Databases & Information Systems (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Medical Informatics (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Storage Device Security (AREA)
Abstract
A controller for finding data to be protected in a database is configured to receive data includes one or more data segments and determines which data segments to protect by applying pattern classification, metadata classification, and data classification. Further, the controller labels the data segment to be protected as sensitive and protects the data segment by applying security policies. The controller is configured to classify the data in a data segment based on at least a partial address, names of persons, file type classification, face detection, and encrypted and/or random content. By virtue of finding sensitive data and then the classification of the sensitive data enables the controller to perform security policies on the sensitive data to protect the sensitive data. As a result, the controller is beneficial to reduce the number of false positives and false negatives and provides a more accurate classification of sensitive data.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/EP2022/054513 WO2023160776A2 (en) | 2022-02-23 | 2022-02-23 | Controller and method for finding data to be protected in database |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/EP2022/054513 WO2023160776A2 (en) | 2022-02-23 | 2022-02-23 | Controller and method for finding data to be protected in database |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2023160776A2 WO2023160776A2 (en) | 2023-08-31 |
WO2023160776A3 true WO2023160776A3 (en) | 2023-11-16 |
Family
ID=80933470
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/EP2022/054513 WO2023160776A2 (en) | 2022-02-23 | 2022-02-23 | Controller and method for finding data to be protected in database |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2023160776A2 (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20180232528A1 (en) * | 2017-02-13 | 2018-08-16 | Protegrity Corporation | Sensitive Data Classification |
EP3726414A1 (en) * | 2019-04-16 | 2020-10-21 | 3M Innovative Properties Company | System and methods for natural pseudonymization of text |
US20200394327A1 (en) * | 2019-06-13 | 2020-12-17 | International Business Machines Corporation | Data security compliance for mobile device applications |
US20210256160A1 (en) * | 2020-02-19 | 2021-08-19 | Harrison-Ai Pty Ltd | Method and system for automated text anonymisation |
-
2022
- 2022-02-23 WO PCT/EP2022/054513 patent/WO2023160776A2/en unknown
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20180232528A1 (en) * | 2017-02-13 | 2018-08-16 | Protegrity Corporation | Sensitive Data Classification |
EP3726414A1 (en) * | 2019-04-16 | 2020-10-21 | 3M Innovative Properties Company | System and methods for natural pseudonymization of text |
US20200394327A1 (en) * | 2019-06-13 | 2020-12-17 | International Business Machines Corporation | Data security compliance for mobile device applications |
US20210256160A1 (en) * | 2020-02-19 | 2021-08-19 | Harrison-Ai Pty Ltd | Method and system for automated text anonymisation |
Non-Patent Citations (1)
Title |
---|
SAHA AAKANKSHA ET AL: "Secrets in Source Code: Reducing False Positives using Machine Learning", 2020 INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS & NETWORKS (COMSNETS), IEEE, 7 January 2020 (2020-01-07), pages 168 - 175, XP033731545, DOI: 10.1109/COMSNETS48256.2020.9027350 * |
Also Published As
Publication number | Publication date |
---|---|
WO2023160776A2 (en) | 2023-08-31 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20220405522A1 (en) | Method for protecting the intellectual property rights of a trained machine learning network model using digital watermarking by adding, on purpose, an anomaly to the training data | |
EP3812988A1 (en) | Method for training and testing adaption network corresponding to obfuscation network capable of processing data to be concealed for privacy, and training device and testing device using the same | |
CN111538963A (en) | Block chain copyright protection system and method based on double chains | |
AU2015383137B2 (en) | Methods and a computing device for determining whether a mark is genuine | |
KR860006731A (en) | How to protect data processing system and its system files | |
CN104077522A (en) | Process integrity detection method of operation system | |
US8272051B1 (en) | Method and apparatus of information leakage prevention for database tables | |
Solovyev | Long-term digital documents storage technology | |
Karthikeyan et al. | Strategy of Trible–E on Solving Trojan Defense in Cyber Crime Cases | |
CN110598397A (en) | Deep learning-based Unix system user malicious operation detection method | |
WO2023160776A3 (en) | Controller and method for finding data to be protected in database | |
CN111695498B (en) | Wood identity detection method | |
Abdulqader et al. | Detection of tamper forgery image in security digital mage | |
Gafny et al. | Poster: applying unsupervised context-based analysis for detecting unauthorized data disclosure | |
CN105844154B (en) | A kind of rogue program detection method based on internal honey jar | |
Zhou et al. | A novel signature based on the combination of global and local signatures for image copy detection | |
Wilkinson | Artificial intelligence, facial recognition technology and data privacy | |
CN115859289A (en) | Lesovirus isolation method based on trusted process tree | |
CN115659324A (en) | Multi-device security management method and system for data security | |
Liu et al. | Terminator: a data-level hybrid framework for intellectual property theft detection and prevention | |
RU2272319C2 (en) | Method for protecting individual label marking of serial product with utilization of interactive electronic database | |
Ketley | Case study: Code of ethics for facial recognition technology | |
Liu et al. | A sensitive file abnormal access detection method based on application classification | |
CN110851864A (en) | Sensitive data automatic identification and processing method and system | |
Atkinson et al. | Myth 15: Facial Recognition Is Inherently Biased |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 22712298 Country of ref document: EP Kind code of ref document: A2 |