Patent Issued for System and method for detecting and transferring sensitive data by inferring context in unstructured domains (USPTO 11810379): United Services Automobile Association - Insurance News | InsuranceNewsNet

InsuranceNewsNet — Your Industry. One Source.™

Sign in
  • Subscribe
  • About
  • Advertise
  • Contact
Home Now reading Newswires
Topics
    • Advisor News
    • Annuity Index
    • Annuity News
    • Companies
    • Earnings
    • Fiduciary
    • From the Field: Expert Insights
    • Health/Employee Benefits
    • Insurance & Financial Fraud
    • INN Magazine
    • Insiders Only
    • Life Insurance News
    • Newswires
    • Property and Casualty
    • Regulation News
    • Sponsored Articles
    • Washington Wire
    • Videos
    • ———
    • About
    • Advertise
    • Contact
    • Editorial Staff
    • Newsletters
  • Exclusives
  • NewsWires
  • Magazine
  • Newsletters
Sign in or register to be an INNsider.
  • AdvisorNews
  • Annuity News
  • Companies
  • Earnings
  • Fiduciary
  • Health/Employee Benefits
  • Insurance & Financial Fraud
  • INN Exclusives
  • INN Magazine
  • Insurtech
  • Life Insurance News
  • Newswires
  • Property and Casualty
  • Regulation News
  • Sponsored Articles
  • Video
  • Washington Wire
  • Life Insurance
  • Annuities
  • Advisor
  • Health/Benefits
  • Property & Casualty
  • Insurtech
  • About
  • Advertise
  • Contact
  • Editorial Staff

Get Social

  • Facebook
  • X
  • LinkedIn
Newswires
Newswires RSS Get our newsletter
Order Prints
November 24, 2023 Newswires
Share
Share
Tweet
Email

Patent Issued for System and method for detecting and transferring sensitive data by inferring context in unstructured domains (USPTO 11810379): United Services Automobile Association

Insurance Daily News

2023 NOV 24 (NewsRx) -- By a News Reporter-Staff News Editor at Insurance Daily News -- From Alexandria, Virginia, NewsRx journalists report that a patent by the inventors Vickers, Darryl Trent (Lytle, TX, US), filed on June 29, 2020, was published online on November 7, 2023.

The patent’s assignee for patent number 11810379 is United Services Automobile Association (San Antonio, Texas, United States).

News editors obtained the following quote from the background information supplied by the inventors: “Sensitive Data Management (SDM) has become an important area of data management, with the near constant reporting of data breaches and inadvertent exposure of personal and financial information. The methods and technologies being used to counter these critical issues have not kept pace with the explosion of data housed and maintained in countless datacenters and cloud providers. The major problem with existing technologies is the over dependence on rudimentary pattern matching for identification of sensitive data. Relying exclusively on patterns alone creates the issue of very high false positive readings. This can lead to data saturation, where the volume of potential findings becomes so large and polluted with suspect false readings that the data in effect becomes useless. To avoid too many false positives, many systems use overly narrow patterns, thereby allowing true positives to pass undetected.

“There is a need in the art for a system and method that addresses the shortcomings discussed above.”

As a supplement to the background information on this patent, NewsRx correspondents also obtained the inventors’ summary information for this patent: “In one aspect, a method of detecting sensitive data in a set of documents include a step of scanning the set of documents, using a pattern matching module, for data elements that have a predetermined data pattern. The method also includes steps of identifying a matching data element in at least one document of the set of documents, using a part of speech module to determine a part of speech label for the matching data element, and determining a part of speech score, where a value of the part of speech score depends on the part of speech label. The method also includes steps of determining a sensitive data score using at least the part of speech score, retrieving a threshold score, identifying the matching data element as comprising sensitive data if the sensitive data score is greater than or equal to the threshold score, and taking a mitigating action when the matching data element comprises sensitive data.

“In another aspect, a method of detecting sensitive data in a set of documents includes steps of scanning the set of documents, using a pattern matching module, for data elements that have a predetermined data pattern, identifying a matching data element in at least one document of the set of documents, and retrieving at least one key term, where the at least one key term is a term associated with documents including sensitive data. The method also includes steps of using a vector space model to represent the matching data element as a first vector and to represent the at least one key term as a second vector, calculating a difference between the first vector and the second vector, determining a vector similarity score using the calculated difference between the first vector and the second vector, determining a sensitive data score using at least the vector similarity score, retrieving a threshold score, identifying the matching data element as comprising sensitive data if the sensitive data score is greater than or equal to the threshold score, and taking a mitigating action when the matching data element comprises sensitive data.

“In another aspect, a method of detecting sensitive data in a set of documents includes steps of scanning the set of documents, using a pattern matching module, for data elements that have a predetermined data pattern, identifying a matching data element in at least one document of the set of documents, using a part of speech module to determine a part of speech label for the matching data element, determining a part of speech score, wherein a value of the part of speech score depends on the part of speech label, and retrieving at least one key term, where the at least one key term is a term associated with documents including sensitive data. The method also includes steps of using a vector space model to represent the matching data element as a first vector and to represent the at least one key term as a second vector, calculating a difference between the first vector and the second vector, determining a vector similarity score using the calculated difference between the first vector and the second vector, determining a sensitive data score using the part of speech score and the vector similarity score, retrieving a threshold score, identifying the matching data element as comprising sensitive data if the sensitive data score is greater than or equal to the threshold score, and taking a mitigating action when the matching data element comprises sensitive data.

“Other systems, methods, features, and advantages of the disclosure will be, or will become, apparent to one of ordinary skill in the art upon examination of the following figures and detailed description. It is intended that all such additional systems, methods, features, and advantages be included within this description and this summary, be within the scope of the disclosure, and be protected by the following claims.”

The claims supplied by the inventors are:

“1. A computer implemented method for transferring sensitive data, comprising executing on a processor the steps of: receiving documents stored in a first data storage system; scanning the documents and identifying sensitive data within a document by: identifying a matching data element in the document; retrieving at least one key term, wherein the at least one key term is a term associated with documents including sensitive data; using a vector space model to represent the matching data element as a first vector and to represent the at least one key term as a second vector; calculating a difference between the first vector and the second vector; determining a vector similarity score using the calculated difference between the first vector and the second vector; determining a sensitive data score using at least the vector similarity score; retrieving a threshold score; identifying the matching data element as comprising sensitive data by determining that the sensitive data score is greater than or equal to the threshold score; transferring the document with the matching data element to a second data storage system that is at a lower risk for a data breach than the first data storage system; wherein calculating the difference between the first vector and the second vector includes taking a cosine distance between the first vector and the second vector; wherein the vector similarity score is equal to the cosine distance times a normalizing factor; and wherein the normalizing factor has a value of one half.

“2. The method according to claim 1, wherein the method includes calculating a part of speech score for the matching data element.

“3. The method according to claim 2, wherein determining the sensitive data score includes using the vector similarity score and the part of speech score.

“4. The method according to claim 3, wherein determining the sensitive data score includes summing the vector similarity score and the part of speech score.

“5. The method according to claim 2, wherein the method further includes determining a part of speech label for the matching data element, wherein the part of speech score is greater than zero when the part of speech label is associated with the subject of a sentence, and wherein the part of speech score is zero when the part of speech label is not associated with the subject of a sentence.

“6. The method according to claim 2, wherein the method further includes determining a part of speech label for the matching data element, wherein the part of speech score is greater than zero when the part of speech label is a noun, and wherein the part of speech score is zero when the part of speech label is not a noun.

“7. The method according to claim 1, wherein the method further includes alerting an owner of the document including the matching data element that the document includes sensitive data.

“8. The method according to claim 1, wherein the method further includes encrypting the document.

“9. The method according to claim 1, wherein the vector space model includes a plurality of vectors corresponding to a plurality of key terms, and wherein the vector similarity score uses the difference between the first vector and each of the plurality of vectors.

“10. The method according to claim 1, wherein the first vector and the second vector are determined by calculating a set of term frequency-inverse document frequency weights for a set of documents including the document.

“11. A system, comprising: a processor; and a non-transitory computer readable medium storing instructions executable by the processor to: receive documents stored in a first data storage system; scan the documents and identify sensitive data within a document by: identifying a matching data element in the document; retrieving at least one key term, wherein the at least one key term is a term associated with documents including sensitive data; using a vector space model to represent the matching data element as a first vector and to represent the at least one key term as a second vector; calculating a difference between the first vector and the second vector; determining a vector similarity score using the calculated difference between the first vector and the second vector; determining a sensitive data score using at least the vector similarity score; retrieving a threshold score; identifying the matching data element as comprising sensitive data by determining that the sensitive data score is greater than or equal to the threshold score; transfer the document with the matching data element to a second data storage system that is at a lower risk for a data breach than the first data storage system; wherein calculating the difference between the first vector and the second vector includes taking a cosine distance between the first vector and the second vector; wherein the vector similarity score is equal to the cosine distance times a normalizing factor; and wherein the normalizing factor has a value of one half.

“12. The system according to claim 11, wherein the instructions are further executable to calculate a part of speech score for the matching data element.

“13. The system according to claim 12, wherein the instructions are further executable to determine the sensitive data score using the vector similarity score and the part of speech score.

“14. The system according to claim 13, wherein the instructions are further executable to determine the sensitive data score by summing the vector similarity score and the part of speech score.

“15. The system according to claim 12, wherein the instructions are further executable to determine a part of speech label for the matching data element, wherein the part of speech score is greater than zero when the part of speech label is associated with the subject of a sentence, and wherein the part of speech score is zero when the part of speech label is not associated with the subject of a sentence.

“16. The system according to claim 12, wherein the instructions are further executable to determine a part of speech label for the matching data element, wherein the part of speech score is greater than zero when the part of speech label is a noun, and wherein the part of speech score is zero when the part of speech label is not a noun.

“17. The system according to claim 11, wherein the instructions are further executable to alert an owner of the document including the matching data element that the document includes sensitive data.

“18. The system according to claim 11, wherein the instructions are further executable to encrypt the document.

“19. The system according to claim 11, wherein the vector space model includes a plurality of vectors corresponding to a plurality of key terms, and wherein the vector similarity score uses the difference between the first vector and each of the plurality of vectors.

“20. The system according to claim 11, wherein the instructions are further executable to determine the first vector and the second vector by calculating a set of term frequency-inverse document frequency weights for a set of documents including the document.”

For additional information on this patent, see: Vickers, Darryl Trent. System and method for detecting and transferring sensitive data by inferring context in unstructured domains. U.S. Patent Number 11810379, filed June 29, 2020, and published online on November 7, 2023. Patent URL (for desktop use only): https://ppubs.uspto.gov/pubwebapp/external.html?q=(11810379)&db=USPAT&type=ids

(Our reports deliver fact-based news of research and discoveries from around the world.)

Older

Patent Issued for Systems and methods for managing and processing vehicle operator accounts based on vehicle operation data (USPTO 11810139): State Farm Mutual Automobile Insurance Company

Newer

Free Updated COVID-19 Vaccines Available to Adults

Advisor News

  • Study finds more households move investable assets across firms
  • Could workplace benefits help solve America’s long-term care gap?
  • The best way to use a tax refund? Create a holistic plan
  • CFP Board appoints K. Dane Snowden as CEO
  • TIAA unveils ‘policy roadmap’ to boost retirement readiness
More Advisor News

Annuity News

  • $80k surrender charge at stake as Navy vet, Ameritas do battle in court
  • Sammons Institutional Group® Launches Summit LadderedSM
  • Protective Expands Life & Annuity Distribution with Alfa Insurance
  • Annuities: A key tool in battling inflation
  • Pinnacle Financial Services Launches New Agent Website, Elevating the Digital Experience for Independent Agents Nationwide
More Annuity News

Health/Employee Benefits News

  • Health insurance cost increases predicted to cut millions from needed protection
  • Department of Labor proposes pharmacy benefit manager fee disclosure rule
  • WALKINSHAW, DUCKWORTH IMPLORE TRUMP ADMINISTRATION TO EXPAND IVF COVERAGE FOR THE MILLIONS OF HARDWORKING AMERICANS ENROLLED IN FEHB PLANS
  • FINEOS and PwC Partner to Drive the Future of Modern Insurance
  • Vermont looking to transform health care system as costs rise
More Health/Employee Benefits News

Life Insurance News

  • AM Best Affirms Credit Ratings of Etiqa General Insurance Berhad
  • Life insurance application activity hits record growth in 2025, MIB reports
  • AM Best Revises Outlooks to Positive for Well Link Life Insurance Company Limited
  • Investors holding $130M in PHL benefits slam liquidation, seek to intervene
  • Elevance making difficult decisions amid healthcare minefield
Sponsor
More Life Insurance News

- Presented By -

Top Read Stories

More Top Read Stories >

NEWS INSIDE

  • Companies
  • Earnings
  • Economic News
  • INN Magazine
  • Insurtech News
  • Newswires Feed
  • Regulation News
  • Washington Wire
  • Videos

FEATURED OFFERS

Elevate Your Practice with Pacific Life
Taking your business to the next level is easier when you have experienced support.

ICMG 2026: 3 Days to Transform Your Business
Speed Networking, deal-making, and insights that spark real growth — all in Miami.

Your trusted annuity partner.
Knighthead Life provides dependable annuities that help your clients retire with confidence.

8.25% Cap Guaranteed for the Full Term
Guaranteed cap rate for 5 & 7 years—no annual resets. Explore Oceanview CapLock FIA.

Press Releases

  • Financial Independence Group Marks 50 Years of Growth, Innovation, and Advisor Support
  • Buckner Insurance Names Greg Taylor President of Idaho
  • ePIC Services Company and WebPrez Announce Exclusive Strategic Relationship; Carter Wilcoxson Appointed President of WebPrez
  • Agent Review Announces Major AI & AIO Platform Enhancements for Consumer Trust and Agent Discovery
  • Prosperity Life Group® Names Industry Veteran Mark Williams VP, National Accounts
More Press Releases > Add Your Press Release >

How to Write For InsuranceNewsNet

Find out how you can submit content for publishing on our website.
View Guidelines

Topics

  • Advisor News
  • Annuity Index
  • Annuity News
  • Companies
  • Earnings
  • Fiduciary
  • From the Field: Expert Insights
  • Health/Employee Benefits
  • Insurance & Financial Fraud
  • INN Magazine
  • Insiders Only
  • Life Insurance News
  • Newswires
  • Property and Casualty
  • Regulation News
  • Sponsored Articles
  • Washington Wire
  • Videos
  • ———
  • About
  • Advertise
  • Contact
  • Editorial Staff
  • Newsletters

Top Sections

  • AdvisorNews
  • Annuity News
  • Health/Employee Benefits News
  • InsuranceNewsNet Magazine
  • Life Insurance News
  • Property and Casualty News
  • Washington Wire

Our Company

  • About
  • Advertise
  • Contact
  • Meet our Editorial Staff
  • Magazine Subscription
  • Write for INN

Sign up for our FREE e-Newsletter!

Get breaking news, exclusive stories, and money- making insights straight into your inbox.

select Newsletter Options
Facebook Linkedin Twitter
© 2026 InsuranceNewsNet.com, Inc. All rights reserved.
  • Terms & Conditions
  • Privacy Policy
  • InsuranceNewsNet Magazine

Sign in with your Insider Pro Account

Not registered? Become an Insider Pro.
Insurance News | InsuranceNewsNet