-
公开(公告)号:US20190384930A1
公开(公告)日:2019-12-19
申请号:US16555488
申请日:2019-08-29
发明人: Yoav Ben-Yair , Gil Fuchs , Itai Gordon , Ilan D. Prager
摘要: A method, computer program product and system for preventing unauthorized access of confidential information. The transmission of data from a first user to a second user is detected. An authorization level corresponding to the second user is then determined. Furthermore, a probability that the authorization level corresponding to the second user and the data is accurate is generated. Additionally, a determination is made that the data includes sensitive information that the second user is not authorized to access based on the authorization level. Moreover, the data can be modified based on the probability, where the data is to be redacted if the probability is within a range of a threshold value or the data is to be blocked from transmission if the probability is above the range.
-
公开(公告)号:US10360404B2
公开(公告)日:2019-07-23
申请号:US15053044
申请日:2016-02-25
发明人: Itai Gordon , Peter Hagelund , Ilan D. Prager
摘要: Embodiments of the present invention disclose a method, computer program product, and system for text author anonymization for de-identification of written text. This may be used to replace written text after learning text author writing characteristics, such frequently written terms, grammar patterns, grammar errors, and writing tone. Portions of the written text which may identify the text author may be replaced, for example the text author writing characteristics, social status, geographical location, and specific organization.
-
公开(公告)号:US20190130123A1
公开(公告)日:2019-05-02
申请号:US15798145
申请日:2017-10-30
发明人: Yoav Ben-Yair , Gil Fuchs , Itai Gordon , Ilan D. Prager
摘要: A method, computer program product and system for preventing unauthorized access of confidential information. The transmission of data from a first user to a second user is detected. An authorization level corresponding to the second user is then determined. Furthermore, a probability that the authorization level corresponding to the second user and the data is accurate is generated. Additionally, a determination is made that the data includes sensitive information that the second user is not authorized to access based on the authorization level. Moreover, the data can be modified based on the probability, where the data is to be redacted if the probability is within a range of a threshold value or the data is to be blocked from transmission if the probability is above the range.
-
公开(公告)号:US20190034647A1
公开(公告)日:2019-01-31
申请号:US15662269
申请日:2017-07-27
发明人: Shlomit Avrahami , Itai Gordon , Elik Katz , Yakir Keisar , Ilan D. Prager , Denis Voloshin
摘要: Disclosed herein is a system and method that can retrieve, via a file monitor, a file and policy data from a case management system or a content management system, wherein the file and the policy data are retrieved in response to detecting a user request for the file. A processor can also modify, via the file monitor, access to the file based on the policy data, and intercept a plurality of document management instructions executed with the file. The processor can also detect at least one of the document management instructions is a malicious action, wherein the malicious action is detected based on the policy data, wherein the policy data is updated in response to detecting each of the document management instructions. Additionally, the processor can execute a policy instruction to prevent execution of the at least one document management instruction.
-
公开(公告)号:US20180039793A1
公开(公告)日:2018-02-08
申请号:US15230843
申请日:2016-08-08
发明人: Itai Gordon , Peter Hagelund
摘要: Disclosed aspects relate to information presentation management by an electronic presentation device. With respect to a set of information for presentation, a set of information profile data is detected. Using a set of sensors linked to the electronic presentation device, a set of device sensor data of the electronic presentation device is collected. Based on both the set of device sensor data and the set of information profile data, a determination of a security configuration for presentation of the set of information on the electronic presentation device is made. Based on the security configuration, the set of information is presented by the electronic presentation device.
-
公开(公告)号:US09886584B2
公开(公告)日:2018-02-06
申请号:US15053555
申请日:2016-02-25
发明人: Yoav Ben-Yair , Gil Fuchs , Itai Gordon , Ilan D. Prager
CPC分类号: G06F21/60 , G06F3/013 , G06F3/015 , G06F21/6254 , G06K9/00302 , G06K9/00885 , G06K9/6201 , G06K2009/00939
摘要: An embodiment of the invention may include a method, computer program product and system for redacting a document. The embodiment may include receiving an unredacted document. The embodiment may include determining portions of the unredacted document containing sensitive information. The embodiment may include applying a redaction method to the portions containing sensitive information to create a redacted document. The redaction method replaces the portion containing sensitive information with a different piece of content. The different piece of content correlates to a most stringent redaction method. The embodiment may include displaying the redacted document to a user. The embodiment may include determining the user is frustrated, and replacing the piece of content with a piece of content corresponding to a next most stringent redaction method from the list of redaction methods. The embodiment may include displaying the updated redacted document to the user.
-
公开(公告)号:US20170249479A1
公开(公告)日:2017-08-31
申请号:US15053044
申请日:2016-02-25
发明人: Itai Gordon , Peter Hagelund , Ilan D. Prager
CPC分类号: G06F21/6254 , G06F17/24 , G06F17/274 , G06F17/2765 , G06F21/6263 , G06N20/00 , H04L63/0407 , H04L63/0421 , H04W12/02
摘要: Embodiments of the present invention disclose a method, computer program product, and system for text author anonymization, the method including intercepting a text from a text author, learning text author writing characteristics, where the text author writing characteristics includes frequently written terms, grammar patterns, grammar errors, and writing tone, identifying a portion of the text where the portion of the text identifies the text author by personal information where the personal information includes the text author writing characteristics, social status, geographical location, and specific organization, and replacing the portion of the text based on the portion of the text identifying the text author.
-
公开(公告)号:US20170249466A1
公开(公告)日:2017-08-31
申请号:US15053555
申请日:2016-02-25
发明人: Yoav Ben-Yair , Gil Fuchs , Itai Gordon , Ilan D. Prager
CPC分类号: G06F21/60 , G06F3/013 , G06F3/015 , G06F21/6254 , G06K9/00302 , G06K9/00885 , G06K9/6201 , G06K2009/00939
摘要: An embodiment of the invention may include a method, computer program product and system for redacting a document. The embodiment may include receiving an unredacted document. The embodiment may include determining portions of the unredacted document containing sensitive information. The embodiment may include applying a redaction method to the portions containing sensitive information to create a redacted document. The redaction method replaces the portion containing sensitive information with a different piece of content. The different piece of content correlates to a most stringent redaction method. The embodiment may include displaying the redacted document to a user. The embodiment may include determining the user is frustrated, and replacing the piece of content with a piece of content corresponding to a next most stringent redaction method from the list of redaction methods. The embodiment may include displaying the updated redacted document to the user.
-
公开(公告)号:US20170249361A1
公开(公告)日:2017-08-31
申请号:US15055672
申请日:2016-02-29
发明人: Itai Gordon , Peter Hagelund , Ilan D. Prager
IPC分类号: G06F17/30
CPC分类号: G06F17/30477 , G06F17/30294 , G06F17/30958
摘要: An example computer-implemented method includes receiving, via a processor, a plurality of structured query statements associated with an application and a database. The method includes detecting, via the processor, a logical relationship between at least two of the plurality of structured query statements based on a common source, a predetermined threshold time, a common transaction. The method includes generating, via the processor, a model based on the detected logical relationship. The method further includes receiving, via the processor, a request to modify the database. The method also further includes modifying, via the processor, the database in response to detecting that a predetermined threshold probability of application functionality impairment is not exceeded.
-
公开(公告)号:US09746920B2
公开(公告)日:2017-08-29
申请号:US14834489
申请日:2015-08-25
发明人: Yoav Ben-Yair , Gil Fuchs , Itai Gordon , Ilan D. Prager
IPC分类号: G06F3/01 , G06K9/00 , G06F17/24 , G06F17/27 , G06F3/0481
CPC分类号: G06F3/013 , G06F3/0481 , G06F3/0482 , G06F3/04842 , G06F3/04883 , G06F3/04886 , G06F17/243 , G06F17/27 , G06K9/00335 , G06K9/00597 , G06K9/00604
摘要: Tracking eye movement during the completion of a form on a mobile computing device to determine possible errors and suggest changes to the form. To improve data quality, eye-tracking data is used to determine input fields on a form that cause issues for a user; based on the eye tracking data, suggestions are made to change a response or to modify the form.
-
-
-
-
-
-
-
-
-