-
公开(公告)号:US20200004989A1
公开(公告)日:2020-01-02
申请号:US16563341
申请日:2019-09-06
IPC分类号: G06F21/62
摘要: A compromised data exchange system extracts data from websites using a crawler, detects portions within the extracted data that resemble personally identifying information (PII) data based on PII data patterns using a risk assessment module, and compares a detected portion to data within a database of disassociated compromised PII data to determine a match using the risk assessment module. A risk score may be assigned to a data item within the database in response to determining the match. In some embodiments, URL data may also be detected in the extracted data. The detected URL data represents further web sites that can be automatically crawled by the system to detect further PII data.
-
公开(公告)号:US20190266355A1
公开(公告)日:2019-08-29
申请号:US16267297
申请日:2019-02-04
IPC分类号: G06F21/62
摘要: In some embodiments, a compromised data exchange system may include an interface configured to couple to a network, a processor, and a memory accessible to the processor. The memory may be configured to store instructions that, when executed, cause the processor to extract data from one or more websites using a crawler, detect portions within the data that resemble personally identifying information (PO) data based on PII data patterns using a risk assessment module, and to compare a detected portion to data within a database of disassociated compromised PII data to determine a match using the risk assessment module. The instructions may further cause the processor to selectively assign a risk score to a data item within the database in response to determining the match using a risk scoring module.
-
公开(公告)号:US20240193305A1
公开(公告)日:2024-06-13
申请号:US18585846
申请日:2024-02-23
IPC分类号: G06F21/62
CPC分类号: G06F21/6263
摘要: A compromised data exchange system extracts data from websites using a crawler, detects portions within the extracted data that resemble personally identifying information (PII) data based on PII data patterns using a risk assessment module, and compares a detected portion to data within a database of disassociated compromised PII data to determine a match using the risk assessment module. A risk score may be assigned to a data item within the database in response to determining the match. In some embodiments, URL data may also be detected in the extracted data. The detected URL data represents further websites that can be automatically crawled by the system to detect further PII data.
-
公开(公告)号:US20230385451A1
公开(公告)日:2023-11-30
申请号:US18301656
申请日:2023-04-17
IPC分类号: G06F21/62
CPC分类号: G06F21/6263
摘要: A compromised data exchange system extracts data from websites using a crawler, detects portions within the extracted data that resemble personally identifying information (PII) data based on PII data patterns using a risk assessment module, and compares a detected portion to data within a database of disassociated compromised PII data to determine a match using the risk assessment module. A risk score may be assigned to a data item within the database in response to determining the match. In some embodiments, URL data may also be detected in the extracted data. The detected URL data represents further websites that can be automatically crawled by the system to detect further PII data.
-
公开(公告)号:US20220321681A1
公开(公告)日:2022-10-06
申请号:US17846396
申请日:2022-06-22
摘要: Systems and methods are provided for implementing reciprocal data sharing in a data exchange system. Limitations may be placed on the amount of data an exchange member may access based on the amount of data contributed. The system may include determining a data contribution associated with a first member of the data exchange, determining a data access limit for the first member based on the data contribution, and providing data to the first member when the first member has not exceeded the data access limit. In some embodiments, there may be separate data access limits for each member of the data exchange, so that a first member may have different access limits when accessing data from a second member, data from a third member, and data from a fourth member. Further, the system may limit a requester to a type of data that corresponds to the type of data contributed.
-
公开(公告)号:US11556671B2
公开(公告)日:2023-01-17
申请号:US17009401
申请日:2020-09-01
IPC分类号: G06F21/62
摘要: A compromised data exchange system extracts data from websites using a crawler, detects portions within the extracted data that resemble personally identifying information (PII) data based on PII data patterns using a risk assessment module, and compares a detected portion to data within a database of disassociated compromised PII data to determine a match using the risk assessment module. A risk score may be assigned to a data item within the database in response to determining the match. In some embodiments, URL data may also be detected in the extracted data. The detected URL data represents further web sites that can be automatically crawled by the system to detect further PII data.
-
公开(公告)号:US20200259925A1
公开(公告)日:2020-08-13
申请号:US16793602
申请日:2020-02-18
IPC分类号: H04L29/08 , H04L12/707 , H04L12/741 , H04L12/825
摘要: Systems and methods are provided for implementing reciprocal data sharing in a data exchange system. Limitations may be placed on the amount of data an exchange member may access based on the amount of data that exchange member has contributed. The system may include determining a data contribution associated with a first member of the data exchange, determining a data access limit for the first member based on the data contribution, and providing data to the first member when the first member has not exceeded the data access limit. In some embodiments, there may be separate data access limits for each member of the data exchange, so that a first member may have different access limits when accessing data from a second member, data from a third member, and data from a fourth member. Further, the system may limit a requester to a type of data that corresponds to the type of data contributed.
-
公开(公告)号:US20240195886A1
公开(公告)日:2024-06-13
申请号:US18582257
申请日:2024-02-20
摘要: Systems and methods are provided for implementing reciprocal data sharing in a data exchange system. Limitations may be placed on the amount of data an exchange member may access based on the amount of data contributed. The system may include determining a data contribution associated with a first member of the data exchange, determining a data access limit for the first member based on the data contribution, and providing data to the first member when the first member has not exceeded the data access limit. In some embodiments, there may be separate data access limits for each member of the data exchange, so that a first member may have different access limits when accessing data from a second member, data from a third member, and data from a fourth member. Further, the system may limit a requester to a type of data that corresponds to the type of data contributed.
-
公开(公告)号:US11630918B2
公开(公告)日:2023-04-18
申请号:US16563341
申请日:2019-09-06
IPC分类号: G06F21/62
摘要: A compromised data exchange system extracts data from websites using a crawler, detects portions within the extracted data that resemble personally identifying information (PII) data based on PII data patterns using a risk assessment module, and compares a detected portion to data within a database of disassociated compromised PII data to determine a match using the risk assessment module. A risk score may be assigned to a data item within the database in response to determining the match. In some embodiments, URL data may also be detected in the extracted data. The detected URL data represents further web sites that can be automatically crawled by the system to detect further PII data.
-
公开(公告)号:US10599872B2
公开(公告)日:2020-03-24
申请号:US16267297
申请日:2019-02-04
摘要: In some embodiments, a compromised data exchange system may include an interface configured to couple to a network, a processor, and a memory accessible to the processor. The memory may be configured to store instructions that, when executed, cause the processor to extract data from one or more websites using a crawler, detect portions within the data that resemble personally identifying information (PO) data based on PII data patterns using a risk assessment module, and to compare a detected portion to data within a database of disassociated compromised PII data to determine a match using the risk assessment module. The instructions may further cause the processor to selectively assign a risk score to a data item within the database in response to determining the match using a risk scoring module.
-
-
-
-
-
-
-
-
-