Patent Issued for Identifying Sensitive Data On Computer Networks (USPTO 10,440,050) - Insurance News | InsuranceNewsNet

InsuranceNewsNet — Your Industry. One Source.™

Sign in
  • Subscribe
  • About
  • Advertise
  • Contact
Home Now reading Newswires
Topics
    • Advisor News
    • Annuity Index
    • Annuity News
    • Companies
    • Earnings
    • Fiduciary
    • From the Field: Expert Insights
    • Health/Employee Benefits
    • Insurance & Financial Fraud
    • INN Magazine
    • Insiders Only
    • Life Insurance News
    • Newswires
    • Property and Casualty
    • Regulation News
    • Sponsored Articles
    • Washington Wire
    • Videos
    • ———
    • About
    • Advertise
    • Contact
    • Editorial Staff
    • Newsletters
  • Exclusives
  • NewsWires
  • Magazine
  • Newsletters
Sign in or register to be an INNsider.
  • AdvisorNews
  • Annuity News
  • Companies
  • Earnings
  • Fiduciary
  • Health/Employee Benefits
  • Insurance & Financial Fraud
  • INN Exclusives
  • INN Magazine
  • Insurtech
  • Life Insurance News
  • Newswires
  • Property and Casualty
  • Regulation News
  • Sponsored Articles
  • Video
  • Washington Wire
  • Life Insurance
  • Annuities
  • Advisor
  • Health/Benefits
  • Property & Casualty
  • Insurtech
  • About
  • Advertise
  • Contact
  • Editorial Staff

Get Social

  • Facebook
  • X
  • LinkedIn
Newswires
Newswires RSS Get our newsletter
Order Prints
October 17, 2019 Newswires
Share
Share
Tweet
Email

Patent Issued for Identifying Sensitive Data On Computer Networks (USPTO 10,440,050)

Insurance Daily News

2019 OCT 17 (NewsRx) -- By a News Reporter-Staff News Editor at Insurance Daily News -- United Services Automobile Association (San Antonio, Texas, United States) has been issued patent number 10,440,050, according to news reporting originating out of Alexandria, Virginia, by NewsRx editors.

The patent’s inventors are Neel, Robert Jason (Boerne, TX); Wright, Jordan Matthew (San Antonio, TX).

This patent was filed on January 27, 2017 and was published online on October 21, 2019.

From the background information supplied by the inventors, news correspondents obtained the following quote: “Enterprises generate and maintain sensitive data. As an example, enterprises generate and maintain data regarding its users’ personal information and/or accounts (e.g., personally identifiable information, contact information, login credentials, account information, and so forth). In some cases, unauthorized third-parties (e.g., hackers) infiltrate enterprise systems to access and steal user information. As this data can be used for malicious purposes by unauthorized third-parties, it is important to protect this data from theft. In some instances, such theft may occur despite security measures.

“In some cases, sensitive data can be shared by unauthorized third-parties over a publically accessible computer system (e.g., a publically accessible website). As an example, sensitive data is often shared on ‘paste’ sites (also called ‘pastebins’) or online forum sites that allow users to anonymously store and publish data on the Internet. When sensitive information is publically distributed in this manner, enterprises and/or users may be unaware of the publication of the sensitive information.”

Supplementing the background information on this patent, NewsRx reporters also obtained the inventors’ summary information for this patent: “Implementations of the present disclosure are generally directed to determining when sensitive information has been published to a network (e.g., the Internet), and alerting any affected users.

“In general, in an aspect, a computer-implemented method can be performed to identify the publication of sensitive data and/or malware to a third-party site. According to the method, at least one processor retrieves data items stored on a computer system over a network, the computer system hosting a third-party site, to which the data items are published. The at least one processor stores the data items in local, computer-readable memory, and processes the data items stored in the local, computer-readable memory based on at least one search criteria. The at least one processor determines that at least one of the data items satisfies the at least one search criteria, and in response, provides an alert identifying the at least one data items.

“Implementations of this aspect can include one or more of the following features.

“In some implementations, the third-party site can be a paste site, and the data items can be paste items published on the paste site.

“In some implementations, one or more of the search criteria can correspond to personally identifiable information, contact information, login credentials, and/or account information associated with one or more users and/or enterprises.

“In some implementations, one or more of the search criteria can correspond to e-mail addresses, mailing addresses, telephone numbers, account numbers, and/or passwords associated with one or more users and/or enterprises.

“In some implementations, one or more of the search criteria can correspond to malicious software or computer code.

“In some implementations, the search criteria can include one or more regular expressions.

“In some implementations, the method can further include monitoring, by the at least one processor, the computing system for newly published data items. The method can further include determining, by the at least one processor, that a data item has been published by the computing system, and in response, retrieving the published data item.

“In some implementations, providing the alert identifying the at least one data items can include: identifying one or more users and/or enterprises associated with information contained within the at least one data items, and transmitting the alert to one or more devices associated with the one or more users and/or enterprises. Identifying one or more users and/or enterprises associated with information contained within the at least one data items can include: obtaining a database including information pertaining to the one or more users and/or enterprises, determining that the information contained within the at least one data item corresponds to information pertaining to a particular user or enterprise, and in response, transmitting the alert to a device associated with that user or enterprise.

“In general, in another aspect, a computer-implemented method can be performed to identify publication of malicious software or code. At least one processor retrieves data items stored on a computer system over a network, the computer system hosting a third-party site, to which the data items are published. The at least one processor determines that at least one of the data items includes encoded executable data, and in response, decodes the encoded executable data. The at least one processor analyzes the decoded executable data in a sandboxed software testing environment.

“Implementations of this aspect can include one or more of the following features.

“In some implementations, analyzing the decoded executable data in the sandboxed software testing environment can include executing the encoded executable data in the sandboxed software testing environment.

“In some implementations, analyzing the decoded executable data in the sandboxed software testing environment can further include identifying an effect of executing the encoded executable data. The effect can include deleting or revising particular data within the sandboxed software testing environment, and/or attempting to contact a particular third-party computer system.

“In some implementations, the method can further include providing an alert identifying the effect.

“In some implementations, the encoded executable data can be encoded in base64.

“In some implementations, the third-party site can be a paste site, and the data items can be paste items published on the paste site.

“In some implementations, the method can further include processing, by the at least one processor, data items stored in the local, computer-readable memory based on at least one search criteria. One or more of the search criteria can correspond to malicious software or computer code.

“In some implementations, the method can further include monitoring, by the at least one processor, the computing system for newly published data items. The method can further include determining, by the at least one processor, that a data item has been published by the computing system, and in response, retrieving the published data item.

“One or more of the implementations described herein can provide various benefits. For example, one or more implementations can allow users to identify sensitive information that has been publically distributed by a third-party computer system over a computer network (e.g., the Internet), and take an appropriate action in response. This is beneficial, for example, as it facilitates timely action to reduce the negative effects of the comprised data. Further, implementations allow a user to identify sensitive information in a manner that masks the user’s identity from the owners or operators of the third-party computer system. Thus, data can be analyzed in a manner that reduces the likelihood of adverse action by the owner or operator of the third-party computer system.

“The details of one or more implementations are set forth in the accompanying drawings and the description below. Other features and advantages will be apparent from the description and drawings, and from the claims.”

The claims supplied by the inventors are:

“What is claimed is:

“1. A computer-implemented method for identifying publication of malicious software or code, the method comprising: retrieving, by at least one processor, data items stored on a computer system over a network, the computer system hosting a third-party site, to which the data items are published; determining, by the at least one processor, that at least one of the data items comprises executable binary data encoded in plain text, wherein determining that at least one of the data items comprises executable binary data encoded in plain text comprises identifying, in at least one of the data items, one or more patterns of text that are indicative of a header found in encoded executable binary files; in response to determining that at least one of the data items comprises executable binary data encoded in plain text, transforming the executable binary data encoded in plain text into an executable binary file; and analyzing the executable binary file in a sandboxed software testing environment.

“2. The method of claim 1, wherein analyzing the executable binary file in the sandboxed software testing environment comprises executing the executable binary file in the sandboxed software testing environment.

“3. The method of claim 1, wherein analyzing the executable binary file in the sandboxed software testing environment further comprises identifying an effect of executing the executable binary file.

“4. The method of claim 3, wherein the effect comprises deleting or revising particular data within the sandboxed software testing environment, and/or attempting to contact a particular third-party computer system.

“5. The method of claim 3, further comprising providing an alert identifying the effect.

“6. The method of claim 1, wherein the executable binary data is encoded in base64.

“7. The method of claim 1, wherein the third-party site is a paste site, and wherein the data items are paste items published on the paste site in plain text.

“8. The method claim 1, further comprising processing, by the at least one processor, the data items stored in the local, computer-readable memory based on at least one search criteria, wherein one or more of the search criteria corresponds to a string of plain text indicative of malicious software or computer code.

“9. The method of claim 1, further comprising monitoring, by the at least one processor, the computing system for newly published data items.

“10. The method of claim 9, further comprising determining, by the at least one processor, that a data item has been published by the computing system, and in response, retrieving the published data item.

“11. A non-transitory computer-readable medium including one or more sequences of instructions which, when executed by one or more processors, causes: retrieving, by the one or more processors, data items stored on a computer system over a network, the computer system hosting a third-party site, to which the data items are published; determining, by the one or more processors, that at least one of the data items comprises executable binary data encoded in plain text, wherein determining that at least one of the data items comprises executable binary data encoded in plain text comprises identifying, in at least one of the data items, one or more patterns of text that are indicative of a header found in encoded executable binary files; in response to determining that at least one of the data items comprises executable binary data encoded in plain text, transforming the executable binary data encoded in plain text into an executable binary file; and analyzing the executable binary file in a sandboxed software testing environment.

“12. The non-transitory computer-readable medium of claim 11, wherein analyzing the executable binary file in the sandboxed software testing environment comprises executing the executable binary file in the sandboxed software testing environment.

“13. The non-transitory computer-readable medium of claim 11, wherein analyzing the executable binary file in the sandboxed software testing environment further comprises identifying an effect of executing the executable binary file.

“14. The non-transitory computer-readable medium of claim 13, wherein the effect comprises deleting or revising particular data within the sandboxed software testing environment, and/or attempting to contact a particular third-party computer system.

“15. The non-transitory computer-readable medium of claim 13, wherein the one or more sequences of instructions, when executed by one or more processors, further causes: providing an alert identifying the effect.

“16. The non-transitory computer-readable medium of claim 11, wherein the executable binary data is encoded in base64.

“17. The non-transitory computer-readable medium of claim 11, wherein the third-party site is a paste site, and wherein the data items are paste items published on the paste site in plain text.

“18. The non-transitory computer-readable medium of claim 11, wherein the one or more sequences of instructions, when executed by one or more processors, further causes: processing, by the one or more processors, the data items stored in the local, computer-readable memory based on at least one search criteria, wherein one or more of the search criteria corresponds to a string of plain text indicative of malicious software or computer code.

“19. The non-transitory computer-readable medium of claim 11, wherein the one or more sequences of instructions, when executed by one or more processors, further causes: monitoring, by the one or more processors, the computing system for newly published data items.

“20. The non-transitory computer-readable medium of claim 19, wherein the one or more sequences of instructions, when executed by one or more processors, further causes: determining, by the one or more processors, that a data item has been published by the computing system, and in response, retrieving the published data item.

“21. A system comprising: one or more processors; and a non-transitory computer-readable medium including one or more sequences of instructions which, when executed by the one or more processors, causes: retrieving, by the one or more processors, data items stored on a computer system over a network, the computer system hosting a third-party site, to which the data items are published; determining, by the one or more processors, that at least one of the data items comprises executable binary data encoded in plain text, wherein determining that at least one of the data items comprises executable binary data encoded in plain text comprises identifying, in at least one of the data items, one or more patterns of text that are indicative of a header found in encoded executable binary files; in response to determining that at least one of the data items comprises executable binary data encoded in plain text, transforming the executable binary data encoded in plain text into an executable binary file; and analyzing the executable binary file in a sandboxed software testing environment.

“22. The system of claim 21, wherein analyzing the executable binary file in the sandboxed software testing environment comprises executing the executable binary file in the sandboxed software testing environment.

“23. The system of claim 21, wherein analyzing the executable binary file in the sandboxed software testing environment further comprises identifying an effect of executing the executable binary file.

“24. The system of claim 23, wherein the effect comprises deleting or revising particular data within the sandboxed software testing environment, and/or attempting to contact a particular third-party computer system.

“25. The system of claim 23, wherein the one or more sequences of instructions, when executed by one or more processors, further causes: providing an alert identifying the effect.

“26. The system of claim 21, wherein the executable binary data is encoded in base64.

“27. The system of claim 21, wherein the third-party site is a paste site, and wherein the data items are paste items published on the paste site in plain text.

“28. The system of claim 21, wherein the one or more sequences of instructions, when executed by one or more processors, further causes: processing, by the one or more processors, the data items stored in the local, computer-readable memory based on at least one search criteria, wherein one or more of the search criteria corresponds to a string of plain text indicative of malicious software or computer code.

“29. The system of claim 21, wherein the one or more sequences of instructions, when executed by one or more processors, further causes: monitoring, by the one or more processors, the computing system for newly published data items.

“30. The system of claim 29, wherein the one or more sequences of instructions, when executed by one or more processors, further causes: determining, by the one or more processors, that a data item has been published by the computing system, and in response, retrieving the published data item.”

For the URL and additional information on this patent, see: Neel, Robert Jason; Wright, Jordan Matthew. Identifying Sensitive Data On Computer Networks. U.S. Patent Number 10,440,050, filed January 27, 2017, and published online on October 21, 2019. Patent URL: http://patft.uspto.gov/netacgi/nph-Parser?Sect1=PTO1&Sect2=HITOFF&d=PALL&p=1&u=%2Fnetahtml%2FPTO%2Fsrchnum.htm&r=1&f=G&l=50&s1=10,440,050.PN.&OS=PN/10,440,050RS=PN/10,440,050

(Our reports deliver fact-based news of research and discoveries from around the world.)

Older

Baltimore Purchases A $20M Cyberinsurance Policy

Newer

Medical Gas Service

Advisor News

  • Mitigating recession-based client anxiety
  • Terri Kallsen begins board chair role at CFP Board
  • Advisors underestimate demand for steady, guaranteed income, survey shows
  • D.C. Digest: 'One Big Beautiful Bill' rebranded 'Working Families Tax Cut'
  • OBBBA and New Year’s resolutions
More Advisor News

Annuity News

  • MetLife Declares First Quarter 2026 Common Stock Dividend
  • Using annuities as a legacy tool: The ROP feature
  • Jackson Financial Inc. and TPG Inc. Announce Long-Term Strategic Partnership
  • An Application for the Trademark “EMPOWER PERSONAL WEALTH” Has Been Filed by Great-West Life & Annuity Insurance Company: Great-West Life & Annuity Insurance Company
  • Talcott Financial Group Launches Three New Fixed Annuity Products to Meet Growing Retail Demand for Secure Retirement Income
More Annuity News

Health/Employee Benefits News

  • Thousands in state face higher health insurance costs
  • Thousands facing higher health insurance costs
  • Trump wants GOP to 'own' health care issue but show 'flexibility' on abortion coverage restrictions
  • Ascension to stay in-network with BCBS
  • New Mexico's insurance exchange sees record enrollment ahead of Jan. 15 deadline
More Health/Employee Benefits News

Life Insurance News

  • U-Haul Holding Company to Participate in KeyBanc Capital Markets Self-Storage Investor Forum
  • Clients want independent agents to blend trusted expertise and digital convenience
  • TPG and Jackson Financial Inc. Announce Strategic Partnership to Accelerate Growth
  • Conn. regulators prep PHL Variable for liquidation after selloff fails
  • New York Life Enters 2026 with Industry-Leading Financial Strength Ratings
Sponsor
More Life Insurance News

- Presented By -

Top Read Stories

More Top Read Stories >

NEWS INSIDE

  • Companies
  • Earnings
  • Economic News
  • INN Magazine
  • Insurtech News
  • Newswires Feed
  • Regulation News
  • Washington Wire
  • Videos

FEATURED OFFERS

Elevate Your Practice with Pacific Life
Taking your business to the next level is easier when you have experienced support.

ICMG 2026: 3 Days to Transform Your Business
Speed Networking, deal-making, and insights that spark real growth — all in Miami.

Your trusted annuity partner.
Knighthead Life provides dependable annuities that help your clients retire with confidence.

8.5% Cap Guaranteed for the Full Term
Guaranteed cap rate for 5 & 7 years—no annual resets. Explore Oceanview CapLock FIA.

Press Releases

  • Two industry finance experts join National Life Group amid accelerated growth
  • National Life Group Announces Leadership Transition at Equity Services, Inc.
  • SandStone Insurance Partners Welcomes Industry Veteran, Rhonda Waskie, as Senior Account Executive
  • Springline Advisory Announces Partnership With Software And Consulting Firm Actuarial Resources Corporation
  • Insuraviews Closes New Funding Round Led by Idea Fund to Scale Market Intelligence Platform
More Press Releases > Add Your Press Release >

How to Write For InsuranceNewsNet

Find out how you can submit content for publishing on our website.
View Guidelines

Topics

  • Advisor News
  • Annuity Index
  • Annuity News
  • Companies
  • Earnings
  • Fiduciary
  • From the Field: Expert Insights
  • Health/Employee Benefits
  • Insurance & Financial Fraud
  • INN Magazine
  • Insiders Only
  • Life Insurance News
  • Newswires
  • Property and Casualty
  • Regulation News
  • Sponsored Articles
  • Washington Wire
  • Videos
  • ———
  • About
  • Advertise
  • Contact
  • Editorial Staff
  • Newsletters

Top Sections

  • AdvisorNews
  • Annuity News
  • Health/Employee Benefits News
  • InsuranceNewsNet Magazine
  • Life Insurance News
  • Property and Casualty News
  • Washington Wire

Our Company

  • About
  • Advertise
  • Contact
  • Meet our Editorial Staff
  • Magazine Subscription
  • Write for INN

Sign up for our FREE e-Newsletter!

Get breaking news, exclusive stories, and money- making insights straight into your inbox.

select Newsletter Options
Facebook Linkedin Twitter
© 2026 InsuranceNewsNet.com, Inc. All rights reserved.
  • Terms & Conditions
  • Privacy Policy
  • InsuranceNewsNet Magazine

Sign in with your Insider Pro Account

Not registered? Become an Insider Pro.
Insurance News | InsuranceNewsNet