[go: up one dir, main page]

WO2019186227A1 - Application data manager - Google Patents

Application data manager Download PDF

Info

Publication number
WO2019186227A1
WO2019186227A1 PCT/IB2018/052017 IB2018052017W WO2019186227A1 WO 2019186227 A1 WO2019186227 A1 WO 2019186227A1 IB 2018052017 W IB2018052017 W IB 2018052017W WO 2019186227 A1 WO2019186227 A1 WO 2019186227A1
Authority
WO
WIPO (PCT)
Prior art keywords
application
data manager
application data
data
analysing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/IB2018/052017
Other languages
French (fr)
Inventor
Pratik Sharma
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to PCT/IB2018/052017 priority Critical patent/WO2019186227A1/en
Publication of WO2019186227A1 publication Critical patent/WO2019186227A1/en
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment

Definitions

  • Application Data Manager which is a software using techniques like Natural Language Processing on application data or analysing and using relationships between different application objects including data objects to discover, classify and identify sensitive and key information for an application.
  • Application Data Manager provides insights into user behaviour when it accessed the application by analysing what changes to different data objects it caused over a period of time given the fixed set of privileges for the user.
  • Application Data Manager also helps in identifying where sensitive and important information is stored along with any access patterns used by different users to access that information.
  • Application Data Manager could also raise alarms if there is any change in sensitive data and log events causing it.
  • Application Data Manager can also enforce advance controls to extend security policies for all application connections from within the network perimeter of the server where the application is deployed.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Storage Device Security (AREA)

Abstract

Here we provide Application Data Manager which is a software using techniques like Natural Language Processing on application data or analysing and using relationships between different application objects including data objects to discover, classify and identify sensitive and key information for an application. Application Data Manager provides insights into user behaviour when it accessed the application by analysing what changes to different data objects it caused over a period of time given the fixed set of privileges for the user. Application Data Manager can also enforce advance controls to extend security policies for all application connections from within the network perimeter of the server where the application is deployed.

Description

Application Data Manager
In this invention we provide Application Data Manager which is a software using techniques like Natural Language Processing on application data or analysing and using relationships between different application objects including data objects to discover, classify and identify sensitive and key information for an application. Application Data Manager provides insights into user behaviour when it accessed the application by analysing what changes to different data objects it caused over a period of time given the fixed set of privileges for the user. Application Data Manager also helps in identifying where sensitive and important information is stored along with any access patterns used by different users to access that information. Application Data Manager could also raise alarms if there is any change in sensitive data and log events causing it. Application Data Manager can also enforce advance controls to extend security policies for all application connections from within the network perimeter of the server where the application is deployed.

Claims

Claims Following is the claim for this invention: -
1. In this invention we provide Application Data Manager which is a
software using techniques like Natural Language Processing on application data or analysing and using relationships between different application objects including data objects to discover, classify and identify sensitive and key information for an application. Application Data Manager provides insights into user behaviour when it accessed the application by analysing what changes to different data objects it caused over a period of time given the fixed set of privileges for the user.
Application Data Manager also helps in identifying where sensitive and important information is stored along with any access patterns used by different users to access that information. Application Data Manager could also raise alarms if there is any change in sensitive data and log events causing it. Application Data Manager can also enforce advance controls to extend security policies for all application connections from within the network perimeter of the server where the application is deployed. The above novel technique of providing data management at application level is the claim for this invention.
PCT/IB2018/052017 2018-03-25 2018-03-25 Application data manager Ceased WO2019186227A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/IB2018/052017 WO2019186227A1 (en) 2018-03-25 2018-03-25 Application data manager

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/IB2018/052017 WO2019186227A1 (en) 2018-03-25 2018-03-25 Application data manager

Publications (1)

Publication Number Publication Date
WO2019186227A1 true WO2019186227A1 (en) 2019-10-03

Family

ID=68058617

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IB2018/052017 Ceased WO2019186227A1 (en) 2018-03-25 2018-03-25 Application data manager

Country Status (1)

Country Link
WO (1) WO2019186227A1 (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5414852A (en) * 1992-10-30 1995-05-09 International Business Machines Corporation Method for protecting data in a computer system
US8561127B1 (en) * 2006-03-01 2013-10-15 Adobe Systems Incorporated Classification of security sensitive information and application of customizable security policies
US20160315974A1 (en) * 2012-12-28 2016-10-27 Intel Corporation Policy-based secure containers for multiple enterprise applications

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5414852A (en) * 1992-10-30 1995-05-09 International Business Machines Corporation Method for protecting data in a computer system
US8561127B1 (en) * 2006-03-01 2013-10-15 Adobe Systems Incorporated Classification of security sensitive information and application of customizable security policies
US20160315974A1 (en) * 2012-12-28 2016-10-27 Intel Corporation Policy-based secure containers for multiple enterprise applications

Similar Documents

Publication Publication Date Title
US11928631B2 (en) Threat detection with business impact scoring
US10339309B1 (en) System for identifying anomalies in an information system
CN110462606B (en) Intelligent security management
US9626528B2 (en) Data leak prevention enforcement based on learned document classification
US11030311B1 (en) Detecting and protecting against computing breaches based on lateral movement of a computer file within an enterprise
WO2018226895A3 (en) Integrated system for rule editing, simulation, version control, and business process management
AU2014315235B2 (en) World-driven access control
GB2594217A (en) Detecting inappropriate activity in the presence of unauthenticated API requests using artificial intelligence
WO2017037443A1 (en) Predictive human behavioral analysis of psychometric features on a computer network
DE112019003431T5 (en) RULES GENERATING WITH THE HELP OF ARTIFICIAL INTELLIGENCE
US20190124108A1 (en) Multiple Presentation Fidelity-Level Based Quantitative Cyber Risk Decision Support System
US20220277033A1 (en) Computer-implemented methods, systems comprising computer-readable media, and electronic devices for narrative-structured representation of and intervention into a network computing environment
WO2016097998A1 (en) System for and method for detection of insider threats
Javadi et al. Monitoring AI services for misuse
US20240364750A1 (en) Computer-implemented methods, systems comprising computer-readable media, and electronic devices for autonomous cybersecurity within a network computing environment
Hsieh et al. AD2: Anomaly detection on active directory log data for insider threat monitoring
WO2018149530A1 (en) Method for operating a network
Majidpour et al. Application of deep learning to enhance the accuracy of intrusion detection in modern computer networks
US12524812B2 (en) Method for characterizing asset groups spanning multiple asset classes in a computer network
Gupta et al. Big Data: A security compliance model
DE112022001483T5 (en) OPERATIONAL COMMAND LIMITS
WO2019186227A1 (en) Application data manager
US20250217480A1 (en) Multivariate threat detection for a ci/cd pipeline
CN117763519B (en) Trusted user architecture construction method, trusted user architecture construction system and readable storage medium
Mansikka Data loss prevention: For securing enterprise data integrity

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18913140

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 18913140

Country of ref document: EP

Kind code of ref document: A1