AUTOMATIC DETECTION OF PERSONAL IDENTIFIABLE INFORMATION

    公开(公告)号:US20230214522A1

    公开(公告)日:2023-07-06

    申请号:US17568845

    申请日:2022-01-05

    Applicant: Intuit Inc.

    CPC classification number: G06F21/6245 G06F16/90335

    Abstract: Described herein are example implementations for the automatic detection and handling of personal identifiable information (PII) in electronic records. In some aspects, a system receives one or more computer readable logs of information for one or more computer services, with each log including a string of characters. The system performs one or more string search algorithm based operations on the entirety of the one or more strings of the one or more computer readable logs to identify a range of the one or more strings to be searched for PII that is less than the entirety of the one or more strings. The system also performs one or more regular expression algorithm based operations on the range of the one or more strings to identify one or more instances of PII. The system generates and outputs an indication of the one or more instances of the PII that are identified.

    Privacy preserving oracle
    7.
    发明授权

    公开(公告)号:US11381381B2

    公开(公告)日:2022-07-05

    申请号:US16427549

    申请日:2019-05-31

    Applicant: INTUIT INC.

    Abstract: Certain aspects of the present disclosure provide techniques for performing computations on encrypted data. One example method generally includes obtaining, at a computing device, encrypted data, wherein the encrypted data is encrypted using fully homomorphic encryption and performing at least one computation on the encrypted data while the encrypted data remains encrypted. The method further includes identifying a clear data operation to perform on the encrypted data and transmitting, from the computing device to a server, a request to perform the clear data operation on the encrypted data, wherein the request includes the encrypted data. The method further includes receiving, at the computing device in response to the request, encrypted output from the server, wherein the encrypted output is of the same size and the same format for all encrypted data transmitted to the server.

    Systems and methods for blocking decryption capabilities in symmetric key encryption

    公开(公告)号:US12212671B2

    公开(公告)日:2025-01-28

    申请号:US18485165

    申请日:2023-10-11

    Applicant: INTUIT INC.

    Abstract: Systems and methods that may be used to provide policies and protocols for blocking decryption capabilities in symmetric key encryption using a unique protocol in which key derivation may include injecting a random string into each key derivation. For example, a policy may be assigned to each client device indicating whether the client device has been assigned encryption only permission or full access permission to both encrypt and decrypt data. The disclosed protocol prevents client devices with encryption only permission from obtaining keys for decryption.

    SYSTEM AND METHOD FOR ASSOCIATING LOGS TO REPOSITORIES USING SOURCE CODE

    公开(公告)号:US20230244474A1

    公开(公告)日:2023-08-03

    申请号:US17589653

    申请日:2022-01-31

    Applicant: Intuit Inc.

    CPC classification number: G06F8/70

    Abstract: A method includes receiving event strings from source code repositories, creating, for the source code repositories, digests of keywords, receiving log strings, and aggregating the log strings into a log group. The method further includes comparing the digests to the log group to generate scores, whereby the scores correlate the digests to the log group. The method further includes selecting a source code repository from the source code repositories according to the scores, and associating the log group to a service corresponding to the source code repository, where the source code repository corresponds to the digest with a highest score.

Patent Agency Ranking