Invention Application
- Patent Title: IMPLEMENTING A MULTI-DIMENSIONAL UNIFIED SECURITY AND PRIVACY POLICY WITH SUMMARIZED ACCESS GRAPHS
-
Application No.: US17205966Application Date: 2021-03-18
-
Publication No.: US20220269792A1Publication Date: 2022-08-25
- Inventor: SUPREETH HOSUR NAGESH RAO , NAVINDRA YADAV , RAVI SANKURATRI , ALOK LALIT WADHWA , ARIA RAHADIAN , BHARATHWAJ SANKARA VISWANATHAN , BRADY SCHULMAN , MATTHEW FINN , PAUL JOHN LESIAK , RAVI SHANKER PRASAD , VASIL DOCHKOV YORDANOV , YIWEI WANG , ZHIWEN ZHANG
- Applicant: SUPREETH HOSUR NAGESH RAO , NAVINDRA YADAV , RAVI SANKURATRI , ALOK LALIT WADHWA , ARIA RAHADIAN , BHARATHWAJ SANKARA VISWANATHAN , BRADY SCHULMAN , MATTHEW FINN , PAUL JOHN LESIAK , RAVI SHANKER PRASAD , VASIL DOCHKOV YORDANOV , YIWEI WANG , ZHIWEN ZHANG
- Applicant Address: US CA Cupertino; US CA Cupertino; US CA Cupertino; US CA Milipitas; US CA San Jose; US CA Mountain View; US NH Milford; US GA Lebanon; US NJ West George; US CA Fremont; US CA San Jose; US CA San Jose; US CA San Jose
- Assignee: SUPREETH HOSUR NAGESH RAO,NAVINDRA YADAV,RAVI SANKURATRI,ALOK LALIT WADHWA,ARIA RAHADIAN,BHARATHWAJ SANKARA VISWANATHAN,BRADY SCHULMAN,MATTHEW FINN,PAUL JOHN LESIAK,RAVI SHANKER PRASAD,VASIL DOCHKOV YORDANOV,YIWEI WANG,ZHIWEN ZHANG
- Current Assignee: SUPREETH HOSUR NAGESH RAO,NAVINDRA YADAV,RAVI SANKURATRI,ALOK LALIT WADHWA,ARIA RAHADIAN,BHARATHWAJ SANKARA VISWANATHAN,BRADY SCHULMAN,MATTHEW FINN,PAUL JOHN LESIAK,RAVI SHANKER PRASAD,VASIL DOCHKOV YORDANOV,YIWEI WANG,ZHIWEN ZHANG
- Current Assignee Address: US CA Cupertino; US CA Cupertino; US CA Cupertino; US CA Milipitas; US CA San Jose; US CA Mountain View; US NH Milford; US GA Lebanon; US NJ West George; US CA Fremont; US CA San Jose; US CA San Jose; US CA San Jose
- Main IPC: G06F21/57
- IPC: G06F21/57 ; G06F21/60

Abstract:
A computerized method for implementing risk discovery with a set of unified security and privacy policies, includes the step of discovering a set of data and a set of data accesses within an enterprise computing system. The method includes the step of classifying the set of discovered data and the set of data accesses with an identification that shows which of the data assets are important or critical for the enterprise. The method includes the step of determining which of the set of discovered data and the set of data accesses have or are associated with sensitive information. The method includes the step of placing the set of discovered data and the set of data accesses that are associated with sensitive information into a set of discovered information about the infrastructure. The method includes the step of determining which of the set of discovered data and the set of data accesses are relevant in the context of a specified governmental data privacy regulation. The method includes the step of placing the set of discovered data and the set of data accesses that are relevant in the context of a specified governmental data privacy regulation into a set of discovered information about the infrastructure. The method includes the step of, with the set of discovered information about the infrastructure, mapping the set of discovered information about the infrastructure to a set of deterministic dimensions.
Information query