Patent Issued for Sensitive data identification in real time for data streaming (USPTO 11757837): International Business Machines Corporation - Insurance News | InsuranceNewsNet

InsuranceNewsNet — Your Industry. One Source.™

Sign in
  • Subscribe
  • About
  • Advertise
  • Contact
Home Now reading Newswires
Topics
    • Advisor News
    • Annuity Index
    • Annuity News
    • Companies
    • Earnings
    • Fiduciary
    • From the Field: Expert Insights
    • Health/Employee Benefits
    • Insurance & Financial Fraud
    • INN Magazine
    • Insiders Only
    • Life Insurance News
    • Newswires
    • Property and Casualty
    • Regulation News
    • Sponsored Articles
    • Washington Wire
    • Videos
    • ———
    • About
    • Meet our Editorial Staff
    • Advertise
    • Contact
    • Newsletters
  • Exclusives
  • NewsWires
  • Magazine
  • Newsletters
Sign in or register to be an INNsider.
  • AdvisorNews
  • Annuity News
  • Companies
  • Earnings
  • Fiduciary
  • Health/Employee Benefits
  • Insurance & Financial Fraud
  • INN Exclusives
  • INN Magazine
  • Insurtech
  • Life Insurance News
  • Newswires
  • Property and Casualty
  • Regulation News
  • Sponsored Articles
  • Video
  • Washington Wire
  • Life Insurance
  • Annuities
  • Advisor
  • Health/Benefits
  • Property & Casualty
  • Insurtech
  • About
  • Advertise
  • Contact
  • Editorial Staff

Get Social

  • Facebook
  • X
  • LinkedIn
Newswires
Newswires RSS Get our newsletter
Order Prints
October 3, 2023 Newswires
Share
Share
Post
Email

Patent Issued for Sensitive data identification in real time for data streaming (USPTO 11757837): International Business Machines Corporation

Insurance Daily News

2023 OCT 03 (NewsRx) -- By a News Reporter-Staff News Editor at Insurance Daily News -- From Alexandria, Virginia, NewsRx journalists report that a patent by the inventors Biller, Ofer Haim (Midreshet Ben Gurion, IL), Sofer, Oded (Midreshet Ben Gurion, IL), filed on April 23, 2020, was published online on September 12, 2023.

The patent’s assignee for patent number 11757837 is International Business Machines Corporation (Armonk, New York, United States).

News editors obtained the following quote from the background information supplied by the inventors: “Identifying and protecting sensitive data is critical for data protection and for meeting regulation requirements (general data protection regulation (GDPR), the California consumer privacy act (CCPA), the health insurance portability and accountability act (HIPAA), payment card industry data security standard (PCI DSS), Sarbanes-Oxley Act (SOX), Iso27000, Etc.). A data firewall, for example Guardium®, may provide automated discovery and classification of sensitive data, data activity monitoring and discovery of unusual activity around sensitive data. The data firewall may protect against unauthorized data access by learning regular user access patterns and can provide alerts on suspicious activities.

“The data firewall typically captures or sniffs data accesses to a database (e.g., requests and responses) in real-time and analyzes the data according to policy rules to identify sensitive data. The data firewall may include a data activity monitor (DAM) and/or file activity monitor (FAM). The requests and responses sniffed by the data firewall may include data packets that may include a query, e.g., a structured query language (SQL) requests, or a response, and associated header information. The header may include metadata such as machine information, network information, user information, client information, etc.

“The classification of data may be performed by parsing the captured data packets, extracting the mapping between the metadata and data (e.g., field name for every value), running a rule engine against the metadata and then scanning the data itself to identify sensitive data. Currently, DAM and FAM products are classifying the captured data offline due to the complexity and performance requirements of the classification process. However, using the classifier in offline mode may be too late for preventing data breach or data tampering.

“Therefore, a method for online classification and identification of sensitive data for data streaming is required.”

As a supplement to the background information on this patent, NewsRx correspondents also obtained the inventors’ summary information for this patent: “According to embodiments of the invention, a system and method for classifying data in real-time may include: capturing a plurality of data packets flowing between a data source machine and a data client; searching at least one of the data packets for tokens associated with sensitive information; if tokens associated with sensitive information are not found in a data packet: allowing the data packet to flow between the data source machine and the data client; and sending the data packet to a comprehensive security analysis, and if tokens associated with sensitive information are found in the data packet: preventing the data packet form flowing between the data source machine and the data client; sending the data packet to a comprehensive security analysis.

“Furthermore, if tokens associated with sensitive information are found in the data packet, embodiments of the invention may include continuing to prevent the data packet from flowing between the data source machine and the data client if the comprehensive security analysis finds security issues: and allowing the data packet to flow between the data source machine and the data client if the comprehensive security analysis finds no security issues.

“According to embodiments of the invention, the data source machine may be selected from: a database server, a file server, a proxy and a database server, a combination of a proxy and a file server, a combination of a network gate and a database server, and a combination of a network gate and a file server.

“According to embodiments of the invention, the data packet may be one of: a query sent from the data client to the data source machine, and a response sent from the data source machine to the data client.

“According to embodiments of the invention, capturing and searching may be performed by a software agent that is installed on the data source machine.”

The claims supplied by the inventors are:

“1. A method for classifying data in real-time, the method comprising: capturing a plurality of data packets flowing between a data source machine and a data client; searching a header of at least one of the data packets for metadata to determine whether the data packet should be allowed or should be further analyzed, wherein the metadata includes at least one of machine information, network information, user information, and client information; if the search of the header indicates that the at least one data packet should be further analyzed, searching raw data of a payload of the at least one of the data packets for tokens, values, expressions, words or phrases associated with sensitive information streaming in or out of a database in real-time without parsing the data packets or knowing which values in the payload fit into each field; if, during the searching of the raw data of the payload, the tokens, values, expressions, words or phrases associated with sensitive information are not found in the payload of a data packet: allowing the data packet to flow between the data source machine and the data client and sending a copy of the data packet to an offline comprehensive security analysis; if, during the searching of the raw data of the payload, tokens, values, expressions, words or phrases associated with sensitive information are found in the data packet: performing a wildcard search, a dictionary search, and a regular expression search of the payload in parallel in parallel for identified terms; and if identified terms are detected, preventing the data packet from flowing between the data source machine and the data client and sending the data packet or a copy of the data packet along with results from the searching of the raw data of the payload, to the offline comprehensive security analysis.

“2. The method of claim 1, wherein if tokens, values, expressions, words or phrases associated with sensitive information are found in the data packet during the searching of the raw data of the payload the method further comprises: permanently blocking the data packet from flowing between the data source machine and the data client or discarding the data packet, if the offline comprehensive security analysis finds security issues; and allowing the data packet to flow between the data source machine and the data client if the offline comprehensive security analysis finds no security issues.

“3. The method of claim 1, further comprising: enhancing or adjusting classification rules used during the searches of the raw data of the payload of the at least one data packets based on the offline comprehensive security analysis wherein: if during the searching of the raw data tokens, values, expressions, words or phrases associated with the sensitive information was found and the offline comprehensive security analysis did not find the at least one packet to contain the sensitive information, then removing search terms from the classification rules that invoked during the searching of the raw data identification of the tokens, values, expressions, words or phrases as being associated with the sensitive information; and if during the searching of the raw data tokens, values, expressions, words or if during the searching of the raw data tokens, values, expressions, words or phrases associated with sensitive information was not found, but the offline comprehensive security analysis did identify the sensitive information within the at least one data packets, then adding search terms to the classification rules that invoked the offline comprehensive security analysis to identify the sensitive information.

“4. The method of claim 1, wherein the data packet is one of: a query sent from the data client to the data source machine, and a response sent from the data source machine to the data client.

“5. The method of claim 1, wherein capturing and searching are performed by a software agent that is installed on the data source machine.

“6. The method of claim 5, wherein performing the offline comprehensive security analysis is performed by a dedicated security server, and wherein the data packet is sent to the dedicated security server for performing the offline comprehensive security analysis.

“7. The method of claim 1, wherein searching the raw data of a payload of the at least one of the data packets for tokens, values, expressions, words or phrases associated with sensitive information streaming in or out of the database in real-time without parsing the data packets or knowing which values in the payload fit into each field further comprises: calculating a security score of the at least one of the data packets as a combination of findings from a regular expression search and a dictionary search, wherein the regular expression search and the dictionary search are associated with a weight and the security score is calculated as a function of the weights and if the security score is above a threshold, the data packet is identified as having sensitive information.

“8. The method of claim 1, wherein the offline comprehensive security analysis comprises: parsing the data packet; mapping metadata to data; building hierarchy of the data; and processing policy rules.

“9. The method of claim 1, comprising: issuing a security alert if tokens, values, expressions, words or phrases associated with sensitive information are found in the data packet and the offline comprehensive security analysis finds security issues.

“10. The method of claim 1, comprising: after capturing, decrypting the plurality of data packets to obtain a header of each packet; analyzing the headers to determine security status of packets associated with the headers; and selecting the at least one data packet based on the security status.

“11. A system for classifying data in real-time, the system comprising: a memory; and a processor configured to: capture a plurality of data packets flowing between a data source machine and a data client; search a header of at least one of the data packets for metadata to determine whether the data packet should be allowed or should be further analyzed, wherein the metadata includes at least one of machine information, network information, user information, and client information; if the search of the header indicates that the at least one data packet should be further analyzed, search raw data of a payload of the at least one of the data packets for tokens associated with sensitive information streaming in or out of a database in real-time without parsing the data packets or knowing which values in the payload fit into each field; if, during the searching of the raw data of the payload, the tokens, values, expressions, words or phrases associated with sensitive information are not found in the payload of a data packet: allow the data packet to flow between the data source machine and the data client and send a copy of the data packet to an offline comprehensive security analysis; if, during the searching of the raw data of the payload, tokens, values, expressions, words or phrases associated with sensitive information are found in the data packet: perform a wildcard search, a dictionary search, and a regular expression search of the payload in parallel in parallel for identified terms; and if identified terms are detected, prevent the data packet from flowing between the data source machine and the data client and send the data packet or a copy of the data packet, along with results from the searching of the raw data of the payload, to the offline comprehensive security analysis.

“12. The system of claim 11, wherein if tokens, values, expressions, words or phrases associated with sensitive information are found in the data packet during the searching of the raw data of the payload, the processor is configured to: permanently block the data packet from flowing between the data source machine and the data client or discard the data packet, if the offline comprehensive security analysis finds security issues; and allow the data packet to flow between the data source machine and the data client if the offline comprehensive security analysis finds no security issues.

“13. The system of claim 11, wherein the processor is further configured to: enhance or adjust classification rules used during the searches of the raw data of the payload of the at least one data packets based on the offline comprehensive security analysis wherein: if during the search of the raw data tokens, values, expressions, words or phrases associated with the sensitive information was found and the offline comprehensive security analysis did not find the at least one packet to contain the sensitive information, then removing search terms from the classification rules that invoked during the searching of the raw data identification of the tokens, values, expressions, words or phrases as being associated with the sensitive information; and if during the search of the raw data tokens, values, expressions, words or phrases associated with sensitive information was not found but the offline comprehensive security analysis did identify the sensitive information within the at least one data packets, then adding search terms to the classification rules that invoked the offline comprehensive security analysis to identify the sensitive information.

“14. The system of claim 11, wherein the data packet is one of: a query sent from the data client to the data source machine, and a response sent from the data source machine to the data client.

“15. The system of claim 11, wherein that the processor is installed on the data source machine, and wherein performing the offline comprehensive security analysis is performed by a dedicated security server, and wherein the processor is configured to send the data packet to the dedicated security server for performing the offline comprehensive security analysis.”

There are additional claims. Please visit full patent to read further.

For additional information on this patent, see: Biller, Ofer Haim. Sensitive data identification in real time for data streaming. U.S. Patent Number 11757837, filed April 23, 2020, and published online on September 12, 2023. Patent URL (for desktop use only): https://ppubs.uspto.gov/pubwebapp/external.html?q=(11757837)&db=USPAT&type=ids

(Our reports deliver fact-based news of research and discoveries from around the world.)

Older

Patent Issued for High speed mainframe application tool (USPTO 11755388): Fidelity Information Services LLC

Newer

Patent Issued for Transaction card with luminous display (USPTO 11755871): Chuang Lien Hao

Advisor News

  • Equitable launches 403(b) pooled employer plan to support nonprofits
  • Financial FOMO is quietly straining relationships
  • GDP growth to rebound in 2027-2029; markets to see more volatility in 2026
  • Health-related costs are the greatest threat to retirement security
  • Social Security literacy is crucial for advisors
More Advisor News

Annuity News

  • Best’s Special Report: Analysis Shows Drastic Shift in Life Insurance Reserves Toward Annuity Products, and a Slide in Credit Quality
  • MetLife to Announce First Quarter 2026 Results
  • CT commissioner: 70% of policyholders covered in PHL liquidation plan
  • ‘I get confused:’ Regulators ponder increasing illustration complexities
  • Three ways the Corebridge/Equitable merger could shake up the annuity market
More Annuity News

Health/Employee Benefits News

  • Insurance resolution sparks backlash
  • Municipalities contend with surprise bills as health costs rise
  • Health care in America should be redesigned Op-ed: We should redesign health care in America. Here's a plan that would help Nebraskans (copy)
  • Humana and Thor hit the Casualty List, can revive and thrive Humana and Thor Hit the Casualty List
  • Pols & Politics: Romney, Patrick, Dukakis, Weld, and Healey to celebrate 20 years of MassHealth
More Health/Employee Benefits News

Life Insurance News

  • An Application for the Trademark “PREMIER ACCESS” Has Been Filed by The Guardian Life Insurance Company of America: The Guardian Life Insurance Company of America
  • AM Best Assigns Credit Ratings to North American Fire & General Insurance Company Limited and North American Life Insurance Company Limited
  • Supporting the ‘better late than never’ market with life insurance
  • Best’s Special Report: Analysis Shows Drastic Shift in Life Insurance Reserves Toward Annuity Products, and a Slide in Credit Quality
  • The child-free client: how advisors can support this growing demographic
More Life Insurance News

- Presented By -

Top Read Stories

More Top Read Stories >

NEWS INSIDE

  • Companies
  • Earnings
  • Economic News
  • INN Magazine
  • Insurtech News
  • Newswires Feed
  • Regulation News
  • Washington Wire
  • Videos

FEATURED OFFERS

Protectors Vegas Arrives Nov 9th - 11th
1,000+ attendees. 150+ speakers. Join the largest event in life & annuities this November.

An FIA Cap That Stays Locked
CapLock™ from Oceanview locks the cap at issue for 5 or 7 years. No resets. Just clarity.

Aim higher with Ascend annuities
Fixed, fixed-indexed, registered index-linked and advisory annuities to help you go above and beyond

Unlock the Future of Index-Linked Solutions
Join industry leaders shaping next-gen index strategies, distribution, and innovation.

Leveraging Underwriting Innovations
See how Pacific Life’s approach to life insurance underwriting can give you a competitive edge.

Bring a Real FIA Case. Leave Ready to Close.
A practical working session for agents who want a clearer, repeatable sales process.

Press Releases

  • RFP #T01525
  • RFP #T01725
  • Insurate expands workers’ comp into: CA, FL, LA, NC, NJ, PA, VA
  • LifeSecure Insurance Company Announces Retirement of Brian Vestergaard, Additions to Executive Leadership
  • RFP #T02226
More Press Releases > Add Your Press Release >

How to Write For InsuranceNewsNet

Find out how you can submit content for publishing on our website.
View Guidelines

Topics

  • Advisor News
  • Annuity Index
  • Annuity News
  • Companies
  • Earnings
  • Fiduciary
  • From the Field: Expert Insights
  • Health/Employee Benefits
  • Insurance & Financial Fraud
  • INN Magazine
  • Insiders Only
  • Life Insurance News
  • Newswires
  • Property and Casualty
  • Regulation News
  • Sponsored Articles
  • Washington Wire
  • Videos
  • ———
  • About
  • Meet our Editorial Staff
  • Advertise
  • Contact
  • Newsletters

Top Sections

  • AdvisorNews
  • Annuity News
  • Health/Employee Benefits News
  • InsuranceNewsNet Magazine
  • Life Insurance News
  • Property and Casualty News
  • Washington Wire

Our Company

  • About
  • Advertise
  • Contact
  • Meet our Editorial Staff
  • Magazine Subscription
  • Write for INN

Sign up for our FREE e-Newsletter!

Get breaking news, exclusive stories, and money- making insights straight into your inbox.

select Newsletter Options
Facebook Linkedin Twitter
© 2026 InsuranceNewsNet.com, Inc. All rights reserved.
  • Terms & Conditions
  • Privacy Policy
  • InsuranceNewsNet Magazine

Sign in with your Insider Pro Account

Not registered? Become an Insider Pro.
Insurance News | InsuranceNewsNet