SYNTHETIC TRAINING DATASETS FOR PERSONALLY IDENTIFIABLE INFORMATION CLASSIFIERS

    公开(公告)号:US20230244811A1

    公开(公告)日:2023-08-03

    申请号:US17589610

    申请日:2022-01-31

    Applicant: Box, Inc.

    CPC classification number: G06F21/6245 G06F21/6272 G06F16/93

    Abstract: Handling user-demanded privacy controls over data of an electronic document collaboration system. A storage facility is configured to store content objects and associated metadata that pertains to the content objects. A user raises a privacy action request that comprises a demand to change how certain content objects that contain personally identifiable information (PII) of the user are handled. A plurality of content objects are classified using a PII classifier that is trained using synthetically-generated training set entries where, rather than reading actual contents from electronic documents of the collaboration system to generate training set entries, instead, the training set entries are generated using words that are randomly selected from a repository of natural language words. When PII corresponding to the user who raised the privacy action request is discovered in content objects, then the content management system modifies those content objects and/or its metadata in accordance with the demand.

    Context-aware content object security

    公开(公告)号:US11616782B2

    公开(公告)日:2023-03-28

    申请号:US16948828

    申请日:2020-10-01

    Applicant: Box, Inc.

    Abstract: As a default, a global permissions model is established. The global permissions model serves for applying a first set of resource access permissions to shared content objects. Additionally, a set of context-aware access policies that govern user interactions over the shared content object is established. When a particular user requests an interaction over a shared content object, then interaction attributes associated with the request are gathered. The context-aware access policies are applied to the request by determining a set of extensible access permissions that are derived from the interaction attributes. The context-aware access policies are enforced by overriding the first set of resource access permissions with dynamically-determined access permissions. When a particular access request is denied, a response is generated in accordance with the set of extensible access permissions and the user is notified. In some cases, the access request is permitted, but only after the user provides a justification.

    AVOIDING USER SESSION MISCLASSIFICATION USING CONFIGURATION AND ACTIVITY FINGERPRINTS

    公开(公告)号:US20200092298A1

    公开(公告)日:2020-03-19

    申请号:US16553106

    申请日:2019-08-27

    Applicant: Box, Inc.

    Abstract: Methods, systems and computer program products for computing system security. Techniques for classifying a potentially unauthorized user as an authorized user involve comparisons of two or more access request times that occur at different computing devices in different geographical locations. Based on those comparisons and the distance between the geographical locations of the different computing devices, a determination is made as to whether or not travel (e.g., via overland travel, via air travel, etc.) between those different geographical locations can be reasonably accomplished within a given time period. If it is determined that the required time for travel between the different geographical locations is greater than the time between the access request times—thus suggesting a spoofing attack or other malfeasance—then the potentially unauthorized (i.e., only potentially malfeasant) access can still be deemed as an authorizable access request by analyzing browser configurations and activity patterns of the potentially unauthorized user.

    Secure content leakage prevention

    公开(公告)号:US11423167B2

    公开(公告)日:2022-08-23

    申请号:US16553149

    申请日:2019-08-27

    Applicant: Box, Inc.

    Inventor: Alok Ojha

    Abstract: Leakage of secure content (e.g., unauthorized dissemination of secure content) is prevented even after a user has downloaded a copy of the secure content. In a content management system, the secure content object is accessible by users who access the secure content by downloading copies. While the downloading of a copy to a user device is permitted, further dissemination is not allowed. To enforce this degree of security, the user downloads a virtual file system that is configured to store a local instance of the secure content object in a secure container of the user device. During ongoing operation of the user device, every data movement operation request associated with the local instance of the secure content object is intercepted. Logic implemented in the downloaded a virtual file system will deny any data movement operation request when a target storage location associated with the data movement operation request is other than a location in the secure container.

    MAPPING OF PERSONALLY-IDENTIFIABLE INFORMATION TO A PERSON BASED ON NATURAL LANGUAGE COREFERENCE RESOLUTION

    公开(公告)号:US20220083604A1

    公开(公告)日:2022-03-17

    申请号:US17334420

    申请日:2021-05-28

    Applicant: Box, Inc.

    Inventor: Alok Ojha

    Abstract: Various corpora of content objects and other information sources beyond the corpora of content objects are processed to identify personally identifiable information (PII). PII that is associated with a named person is codified into a first portion of a graph-oriented data structure. Also, PII that is associated with an alias that might refer to a named person is codified into a second portion of the graph-oriented data structure. A determination is made that the alias that might refer to a named person is indeed an alias that is a coreference to the named person. Based on that determination then, since the first portion of the graph and the second portion of the graph refer to the same person, then the PII of the second portion of the graph can be deemed to be PII of the same person. PII in common and/or language processing can be used to establish coreferences.

    MANAGING SHARED CONTENT DIRECTORY STRUCTURE METADATA

    公开(公告)号:US20200220928A1

    公开(公告)日:2020-07-09

    申请号:US16243036

    申请日:2019-01-08

    Applicant: Box, Inc.

    Abstract: Methods, systems and computer program products for managing shared content directory structure metadata stored on client devices. A method embodiment includes identifying a collaboration system that stores one or more content objects that are organized in accordance with a directory structure. Requests pertaining to the content objects are raised by processing entities running on the client device. The requests include instructions to retrieve one or more of multiple types of metadata associated with the directory elements that constitute the directory structure. Based on timing and patterns of requests pertaining to the content objects, a monitoring function detects unwanted runaway retrieval by a runaway process. To prevent further unwanted runaway retrieval of the metadata, the runaway process is blocked from continuing its pattern of unwanted (runaway) retrieval. The collaboration system is notified of characteristics of the runaway process. Some or all of the unwanted retrievals are remediated automatically.

    CONTEXT-AWARE CONTENT OBJECT SECURITY
    7.
    发明申请

    公开(公告)号:US20200092337A1

    公开(公告)日:2020-03-19

    申请号:US16553057

    申请日:2019-08-27

    Applicant: Box, Inc.

    Abstract: As a default, a global permissions model is established. The global permissions model serves for applying a first set of resource access permissions to shared content objects. Additionally, a set of context-aware access policies that govern user interactions over the shared content object is established. When a particular user requests an interaction over a shared content object, then interaction attributes associated with the request are gathered. The context-aware access policies are applied to the request by determining a set of extensible access permissions that are derived from the interaction attributes. The context-aware access policies are enforced by overriding the first set of resource access permissions with dynamically-determined access permissions. When a particular access request is denied, a response is generated in accordance with the set of extensible access permissions and the user is notified. In some cases, the access request is permitted, but only after the user provides a justification.

    Mapping of personally-identifiable information to a person-based on traversal of a graph

    公开(公告)号:US12008045B2

    公开(公告)日:2024-06-11

    申请号:US17334440

    申请日:2021-05-28

    Applicant: Box, Inc.

    Inventor: Alok Ojha

    Abstract: Various corpora of content objects and other information sources beyond the corpora of content objects are processed to identify personally identifiable information (PII). PII that is associated with a named person is codified into a first portion of a graph-oriented data structure. Also, PII that is associated with an alias that might refer to a named person is codified into a second portion of the graph-oriented data structure. A determination is made that the alias that might refer to a named person is indeed an alias that is a coreference to the named person. Based on that determination then, since the first portion of the graph and the second portion of the graph refer to the same person, then the PII of the second portion of the graph can be deemed to be PII of the same person. PII in common and/or language processing can be used to establish coreferences.

    Mapping of personally-identifiable information to a person based on natural language coreference resolution

    公开(公告)号:US11741163B2

    公开(公告)日:2023-08-29

    申请号:US17334420

    申请日:2021-05-28

    Applicant: Box, Inc.

    Inventor: Alok Ojha

    Abstract: Various corpora of content objects and other information sources beyond the corpora of content objects are processed to identify personally identifiable information (PII). PII that is associated with a named person is codified into a first portion of a graph-oriented data structure. Also, PII that is associated with an alias that might refer to a named person is codified into a second portion of the graph-oriented data structure. A determination is made that the alias that might refer to a named person is indeed an alias that is a coreference to the named person. Based on that determination then, since the first portion of the graph and the second portion of the graph refer to the same person, then the PII of the second portion of the graph can be deemed to be PII of the same person. PII in common and/or language processing can be used to establish coreferences.

Patent Agency Ranking