REAL-TIME AGREEMENT ANALYSIS
    4.
    发明申请
    REAL-TIME AGREEMENT ANALYSIS 有权
    实时协议分析

    公开(公告)号:US20160381046A1

    公开(公告)日:2016-12-29

    申请号:US14747239

    申请日:2015-06-23

    IPC分类号: H04L29/06 G06F17/21 G06Q10/06

    摘要: Techniques for informing a user about an agreement including agreement terms and trustworthiness of data source are described herein. In some examples, a processor receives agreement document data While the data is in route to a client device. A system receives network sources and content data of the agreement document. The network sources are to be processed by the processor with traffic analytics, and the content data is to be processed with text analytics. The output of these analytics is used to generate an agreement risk event for delivery to the client device with the original agreement document data.

    摘要翻译: 本文描述了用于向用户通知包括协议条款和数据源的可信赖性的协议的技术。 在一些示例中,处理器接收协议文档数据,而数据正在路由到客户端设备。 系统接收协议文件的网络源和内容数据。 网络源将由具有流量分析的处理器处理,并且内容数据将通过文本分析进行处理。 这些分析的输出用于生成协议风险事件,以便将原始协议文档数据传送到客户端设备。

    DETECTION AND PREVENTION OF SENSITIVE INFORMATION LEAKS
    5.
    发明申请
    DETECTION AND PREVENTION OF SENSITIVE INFORMATION LEAKS 有权
    检测和预防敏感信息泄漏

    公开(公告)号:US20150242639A1

    公开(公告)日:2015-08-27

    申请号:US14546422

    申请日:2014-11-18

    IPC分类号: G06F21/60

    摘要: Examples of techniques for detecting and preventing sensitive information leaks are described herein. In one example, a method for detection of sensitive information leaks includes computing, via a processor, a set of rules that identify sensitive information, and sending, via the processor, the set of rules to a dispatcher application using a protocol. The method can also include detecting, via the processor, that at least one data block of the transmitted data matches the set of rules, and executing, via the processor, a corrective action in response to detecting that at least one of the transmitted data blocks matches the set of rules.

    摘要翻译: 本文描述了用于检测和防止敏感信息泄漏的技术的示例。 在一个示例中,用于检测敏感信息泄漏的方法包括经由处理器计算识别敏感信息的一组规则,以及经由处理器将该组规则发送到使用协议的调度器应用程序。 该方法还可以包括经由处理器检测所发送的数据的至少一个数据块与该组规则相匹配,并且响应于检测到所发送的数据块中的至少一个,经由处理器执行校正动作 匹配一组规则。

    REAL-TIME AGREEMENT ANALYSIS
    8.
    发明申请
    REAL-TIME AGREEMENT ANALYSIS 有权
    实时协议分析

    公开(公告)号:US20160380971A1

    公开(公告)日:2016-12-29

    申请号:US15148087

    申请日:2016-05-06

    IPC分类号: H04L29/06

    摘要: Techniques for informing a user about an agreement including agreement terms and trustworthiness of data source are described herein. In some examples, a processor receives agreement document data while the data is in route to a client device. A system receives network sources and content data of the agreement document. The network sources are to be processed by the processor with traffic analytics, and the content data is to be processed with text analytics. The output of these analytics is used to generate an agreement risk event for delivery to the client device with the original agreement document data.

    摘要翻译: 本文描述了用于向用户通知包括协议条款和数据源的可信赖性的协议的技术。 在一些示例中,处理器在数据进入客户端设备的路由器中接收协议文档数据。 系统接收协议文件的网络源和内容数据。 网络源将由具有流量分析的处理器处理,并且内容数据将通过文本分析进行处理。 这些分析的输出用于生成协议风险事件,以便将原始协议文档数据传送到客户端设备。

    Real-time data leakage prevention and reporting

    公开(公告)号:US10169603B2

    公开(公告)日:2019-01-01

    申请号:US15071347

    申请日:2016-03-16

    IPC分类号: G06F21/62 G06F9/445 G06F17/30

    摘要: Aspects include detecting that an extract transform load (ETL) job in an ETL system has been submitted for execution. The ETL job can include an input data storage location and an output data storage location. The ETL job is analyzed to predict whether execution of the ETL job will result in sensitive information being made accessible to an unauthorized user. The analyzing can be based on a sensitivity status of contents of the input data storage location and a data lineage of contents of the output data storage location. The ETL job is prevented from executing based on predicting that execution of the ETL job will result in sensitive information being made accessible to an unauthorized user. Execution of the ETL job is initiated based on predicting that execution of the ETL job will not result in sensitive information being made accessible to an unauthorized user.