WO2019186227A1 - Application data manager - Google Patents
Application data manager Download PDFInfo
- Publication number
- WO2019186227A1 WO2019186227A1 PCT/IB2018/052017 IB2018052017W WO2019186227A1 WO 2019186227 A1 WO2019186227 A1 WO 2019186227A1 IB 2018052017 W IB2018052017 W IB 2018052017W WO 2019186227 A1 WO2019186227 A1 WO 2019186227A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- application
- data manager
- application data
- data
- analysing
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/60—Software deployment
Definitions
- Application Data Manager which is a software using techniques like Natural Language Processing on application data or analysing and using relationships between different application objects including data objects to discover, classify and identify sensitive and key information for an application.
- Application Data Manager provides insights into user behaviour when it accessed the application by analysing what changes to different data objects it caused over a period of time given the fixed set of privileges for the user.
- Application Data Manager also helps in identifying where sensitive and important information is stored along with any access patterns used by different users to access that information.
- Application Data Manager could also raise alarms if there is any change in sensitive data and log events causing it.
- Application Data Manager can also enforce advance controls to extend security policies for all application connections from within the network perimeter of the server where the application is deployed.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Databases & Information Systems (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Storage Device Security (AREA)
Abstract
Here we provide Application Data Manager which is a software using techniques like Natural Language Processing on application data or analysing and using relationships between different application objects including data objects to discover, classify and identify sensitive and key information for an application. Application Data Manager provides insights into user behaviour when it accessed the application by analysing what changes to different data objects it caused over a period of time given the fixed set of privileges for the user. Application Data Manager can also enforce advance controls to extend security policies for all application connections from within the network perimeter of the server where the application is deployed.
Description
Application Data Manager
In this invention we provide Application Data Manager which is a software using techniques like Natural Language Processing on application data or analysing and using relationships between different application objects including data objects to discover, classify and identify sensitive and key information for an application. Application Data Manager provides insights into user behaviour when it accessed the application by analysing what changes to different data objects it caused over a period of time given the fixed set of privileges for the user. Application Data Manager also helps in identifying where sensitive and important information is stored along with any access patterns used by different users to access that information. Application Data Manager could also raise alarms if there is any change in sensitive data and log events causing it. Application Data Manager can also enforce advance controls to extend security policies for all application connections from within the network perimeter of the server where the application is deployed.
Claims
1. In this invention we provide Application Data Manager which is a
software using techniques like Natural Language Processing on application data or analysing and using relationships between different application objects including data objects to discover, classify and identify sensitive and key information for an application. Application Data Manager provides insights into user behaviour when it accessed the application by analysing what changes to different data objects it caused over a period of time given the fixed set of privileges for the user.
Application Data Manager also helps in identifying where sensitive and important information is stored along with any access patterns used by different users to access that information. Application Data Manager could also raise alarms if there is any change in sensitive data and log events causing it. Application Data Manager can also enforce advance controls to extend security policies for all application connections from within the network perimeter of the server where the application is deployed. The above novel technique of providing data management at application level is the claim for this invention.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| PCT/IB2018/052017 WO2019186227A1 (en) | 2018-03-25 | 2018-03-25 | Application data manager |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| PCT/IB2018/052017 WO2019186227A1 (en) | 2018-03-25 | 2018-03-25 | Application data manager |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2019186227A1 true WO2019186227A1 (en) | 2019-10-03 |
Family
ID=68058617
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/IB2018/052017 Ceased WO2019186227A1 (en) | 2018-03-25 | 2018-03-25 | Application data manager |
Country Status (1)
| Country | Link |
|---|---|
| WO (1) | WO2019186227A1 (en) |
Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US5414852A (en) * | 1992-10-30 | 1995-05-09 | International Business Machines Corporation | Method for protecting data in a computer system |
| US8561127B1 (en) * | 2006-03-01 | 2013-10-15 | Adobe Systems Incorporated | Classification of security sensitive information and application of customizable security policies |
| US20160315974A1 (en) * | 2012-12-28 | 2016-10-27 | Intel Corporation | Policy-based secure containers for multiple enterprise applications |
-
2018
- 2018-03-25 WO PCT/IB2018/052017 patent/WO2019186227A1/en not_active Ceased
Patent Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US5414852A (en) * | 1992-10-30 | 1995-05-09 | International Business Machines Corporation | Method for protecting data in a computer system |
| US8561127B1 (en) * | 2006-03-01 | 2013-10-15 | Adobe Systems Incorporated | Classification of security sensitive information and application of customizable security policies |
| US20160315974A1 (en) * | 2012-12-28 | 2016-10-27 | Intel Corporation | Policy-based secure containers for multiple enterprise applications |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US11928631B2 (en) | Threat detection with business impact scoring | |
| US10339309B1 (en) | System for identifying anomalies in an information system | |
| CN110462606B (en) | Intelligent security management | |
| US9626528B2 (en) | Data leak prevention enforcement based on learned document classification | |
| US11030311B1 (en) | Detecting and protecting against computing breaches based on lateral movement of a computer file within an enterprise | |
| WO2018226895A3 (en) | Integrated system for rule editing, simulation, version control, and business process management | |
| AU2014315235B2 (en) | World-driven access control | |
| GB2594217A (en) | Detecting inappropriate activity in the presence of unauthenticated API requests using artificial intelligence | |
| WO2017037443A1 (en) | Predictive human behavioral analysis of psychometric features on a computer network | |
| DE112019003431T5 (en) | RULES GENERATING WITH THE HELP OF ARTIFICIAL INTELLIGENCE | |
| US20190124108A1 (en) | Multiple Presentation Fidelity-Level Based Quantitative Cyber Risk Decision Support System | |
| US20220277033A1 (en) | Computer-implemented methods, systems comprising computer-readable media, and electronic devices for narrative-structured representation of and intervention into a network computing environment | |
| WO2016097998A1 (en) | System for and method for detection of insider threats | |
| Javadi et al. | Monitoring AI services for misuse | |
| US20240364750A1 (en) | Computer-implemented methods, systems comprising computer-readable media, and electronic devices for autonomous cybersecurity within a network computing environment | |
| Hsieh et al. | AD2: Anomaly detection on active directory log data for insider threat monitoring | |
| WO2018149530A1 (en) | Method for operating a network | |
| Majidpour et al. | Application of deep learning to enhance the accuracy of intrusion detection in modern computer networks | |
| US12524812B2 (en) | Method for characterizing asset groups spanning multiple asset classes in a computer network | |
| Gupta et al. | Big Data: A security compliance model | |
| DE112022001483T5 (en) | OPERATIONAL COMMAND LIMITS | |
| WO2019186227A1 (en) | Application data manager | |
| US20250217480A1 (en) | Multivariate threat detection for a ci/cd pipeline | |
| CN117763519B (en) | Trusted user architecture construction method, trusted user architecture construction system and readable storage medium | |
| Mansikka | Data loss prevention: For securing enterprise data integrity |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 18913140 Country of ref document: EP Kind code of ref document: A1 |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 18913140 Country of ref document: EP Kind code of ref document: A1 |