Sign In to Follow Application
View All Documents & Correspondence

“Data Security System For Securely Storing Data”

Abstract: Accordingly, a data security system for securely storing data is disclosed. The system comprising of; Registering the user with database of the website; Filtering the data from data input device (personal computer); Extracting the security sensitive data and storing it separately in another memory segment; Saving the security sensitive data in different memory segment of a user computer attached with the database of the website; Removing the other data and security sensitive data followed by Encrypting all the data to enhance security; and Sending security alerts from time to time.

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
28 December 2019
Publication Number
27/2021
Publication Type
INA
Invention Field
COMPUTER SCIENCE
Status
Email
ipr@optimisticip.com
Parent Application

Applicants

MESBRO TECHNOLOGIES PRIVATE LIMITED
Flat no C/904, Geomatrix Dev, Plot no 29, Sector 25, Kamothe, Raigarh-410209, Maharashtra, India

Inventors

1. Mr. Bhaskar Vijay Ajgaonkar
Flat no C/904, Geomatrix Dev, Plot no 29, Sector 25, Kamothe, Raigarh-410209, Maharashtra, India

Specification

Claims:We claim:
1. A data security system for securely storing data comprising of;
a. Registering the user with database of the website;
b. Filtering the data from data input device (personal computer);
c. Extracting the security sensitive data and storing it separately in another memory segment;
d. Saving the security sensitive data in different memory segment of a user computer attached with the database of the website;
e. Removing the other data and security sensitive data followed by Encrypting all the data to enhance security; and
f. Sending security alerts to users from time to time.
2. The system as claimed in claim 1, wherein the said system encrypts said subsets of extracted data with corresponding degrees of encryption associated with said plurality of security levels, and including decrypting, during the reconstruction, of some or all of said subsets of extracted data only in the presence of said predetermined security clearance of said plurality of security levels.
3. The system as claimed in claim 1, wherein the said extracting utilizes one of an inference engine, neural network and artificial intelligence process.
, Description:FIELD OF THE INVENTION:
The present invention relates to data security. The present invention more particularly relates to a data security system for securely storing data and an adaptive system responsive to hacking attempts and hacking attacks.
BACKGROUND OF THE INVENTION:
The world is going digital at an unprecedentedly fast pace, and the change is only going to go even faster. The digitalization means everything is moving at lightning speed – business, entertainment, trends, new products, etc. The consumer gets what he or she wants instantly because the service provider has the means to deliver it.
There are many benefits of this digital era, it also brings with it several negatives. One of the most significant and destructive threats it poses is that our private information is at risk like never before. The last decade or so has seen hundreds of cases of identity theft, loss of money, and data breaches. Cyberattacks in nature are very pervasive and affect every individual, business, and government bodies alike. Cybercriminals can reach their targets in any part of the world at any time.
A typical cyber-attack is an attempt by adversaries or cybercriminals trying to access, alter, or damage a target’s computer system or network in an unauthorized way. It is systematic, intended, and calculated exploitation of technology to affect computer networks and systems to disrupt organizations and operations reliant on them.
The extensive use of computers and the continued expansion of telecommunications networks, particularly the Internet, enable businesses, governments and individuals to create documents (whether text, characters, icons, images or a combination thereof, sound, video, and data objects in general, sometimes referred to generally herein as “data objects”) and distribute those documents widely to others. Although the production, distribution and publication of documents is generally beneficial to society, there is a need to limit the distribution and publication of security sensitive words, characters or icons. Concerns regarding the privacy of certain data (for example, an individual's social security number, credit history, medical history, business trade secrets and financial data) is an important issue in society. In another words, individuals and businesses have a greater concern regarding maintaining the secrecy of certain information in view of the increasing ease of distribution of documents through computer networks and the Internet.
So there is a need for such a data security system which can reach to every part of the world at any time. The present invention is a data security system for securely storing data and an adaptive system responsive to hacking attempts and hacking attacks.
OBJECTS OF THE INVENTION:
An object of the present invention is to provide a data security system for securely storing data and to provide an adaptive system responsive to hacking attempts and hacking attacks.
Another object of the present invention is to provide a system for securing data which is highly flexible and programmable by a user.
Yet another object of the present invention is to provide a system for securing data on a single personal computer (PC), on a plurality of computers linked together through a local area network (LAN) or a wide area network (WAN) or the Internet.
Other objects and benefits of the present invention will be more apparent from the following description, which is not intended to bind the scope of the present invention.
SUMMARY OF THE INVENTION:
Accordingly, a data security system for securely storing data is disclosed. The system comprising of;
a. Registering the user with database of the website;
b. Filtering the data from data input device (personal computer);
c. Extracting the security sensitive data and storing it separately in another memory segment;
d. Saving the security sensitive data in different memory segment of a user computer attached with the database of the website;
e. Removing the other data and security sensitive data followed by Encrypting all the data to enhance security; and
f. Sending security alerts from time to time.
DESCRIPTION OF THE DRAWINGS:
Fig 1 is the data security system for securely storing data and to provide an adaptive system responsive to hacking attempts and hacking attacks.
DETAILED DESCRIPTION OF THE INVENTION WITH RESPECT TO DRAWINGS:
The present invention is a data security system for securely storing data and rebuilding that data and to provide an adaptive system responsive to hacking attempts and hacking attacks. The present invention provides a system for securing data which is highly flexible and programmable by a user and for securing data on a single personal computer (PC), on a plurality of computers linked together through a local area network (LAN) or a wide area network (WAN) or the Internet. The present invention creates a credit card number or financial data scrubber. The scrubber may be employed to remove any security critical data and to permit the user to decide on and select a level of risk he or she believes appropriate by selecting no, minimal, intermediate or maximum levels of data security.
In another embodiment, the system of the present invention used in detection and prediction of new, complex threats. They process the nature of past attacks and threats and identify other potential attacks that could occur in the same vein or style. Applying machine learning and artificial intelligence to improve cybersecurity saves an organization a considerable amount of time and money that would have otherwise been spent by cybersecurity experts.
Machine learning is most effective as a tool when it has access to a large pool of data to learn and analyze from, reducing attack surfaces through predictive analytics. The volume of security alerts that appear daily can be very overwhelming for the security team. Without the assistance of these systems, these experts would be forced to spend copious amounts of time identifying these threats on their own, or worse, waiting until an attack occurs for them to carry out diagnostic investigations.
In one embodiment, network security and network topography are two important but time consuming activities. AI is used to expedite these processes by observing and learning network traffic patterns and suggesting security policies. It helps to save time, effort. AI creates a pattern of your behavior by analyzing how you use your device and online platforms. The details can include everything from your typical login times and IP addresses to your typing and scrolling patterns. If AI detects some unusual activities or any behavior that falls outside standard patterns, it can flag it as being done by a suspicious user or even block the user. The activities that tick off the AI algorithms can be anything from large online purchases shipped to addresses other than the usual address, a sudden spike in document download from archived folders, or a sudden change in typing speed.
In another embodiment, traditionally security measures depend upon antivirus software like firewall, quick heal and other tools on detecting and preventing web security threats. Timely update of software and the attitude of a person who is in charge of security would determine the level of security website or virtual platform. AI depends upon innovative technologies like Machine Learning, Deep Learning, Natural Language Processing etc to make difficult for hackers to gain access to servers and other valuable information stored inside computers.
The present invention is a system of securing data through artificial intelligence. Some security sensitive words, icons, are set and data from many computers is filtered and security sensitive data is sorted out. The present invention helps to recognize patterns in web requests and automatically block those that could be a threat. The present invention simplifies and strengthens online security by removing a large portion of the manual effort and suggesting and storing passwords to reduce chances of being hacked.
AI uses machine learning to detect similarities and differences within a data set and report any anomalies. Machine learning is a part of AI that can help to recognize patterns in data and predict effects based on past experience and data. AI systems, in most of the cases, use machine learning technology to generate results that replicate human functioning. The present invention Use filters for URLs to block malicious links that potentially have a virus or malware. The present invention Install firewalls and other malware scanners to protect systems and to update them constantly to match redesigned malware. The present invention monitors outgoing traffic and apply exit filters to restrict this type of traffic and review the latest cyber threats and security protocols to get information about which the risks firstly managed and to develop security protocols.
In another embodiment, a data security system for securely storing data comprising of;
g. Registering the user with database of the website;
h. Filtering the data from data input device (personal computer);
i. Extracting the security sensitive data and storing it separately in another memory segment;
j. Saving the security sensitive data in different memory segment of a user computer attached with the database of the website;
k. Removing the other data and security sensitive data followed by Encrypting all the data to enhance security; and
l. Sending security alerts to users from time to time.
wherein encrypting said subsets of extracted data with corresponding degrees of encryption associated with said plurality of security levels, and including decrypting, during the reconstruction, of some or all of said subsets of extracted data only in the presence of said predetermined security clearance of said plurality of security levels. Extracting utilizes one of an inference engine, neural network and artificial intelligence process.

Documents

Application Documents

# Name Date
1 201921054330-STATEMENT OF UNDERTAKING (FORM 3) [28-12-2019(online)].pdf 2019-12-28
2 201921054330-POWER OF AUTHORITY [28-12-2019(online)].pdf 2019-12-28
3 201921054330-FORM FOR STARTUP [28-12-2019(online)].pdf 2019-12-28
4 201921054330-FORM FOR SMALL ENTITY(FORM-28) [28-12-2019(online)].pdf 2019-12-28
5 201921054330-FORM 1 [28-12-2019(online)].pdf 2019-12-28
6 201921054330-FIGURE OF ABSTRACT [28-12-2019(online)].jpg 2019-12-28
7 201921054330-EVIDENCE FOR REGISTRATION UNDER SSI(FORM-28) [28-12-2019(online)].pdf 2019-12-28
8 201921054330-EVIDENCE FOR REGISTRATION UNDER SSI [28-12-2019(online)].pdf 2019-12-28
9 201921054330-DRAWINGS [28-12-2019(online)].pdf 2019-12-28
10 201921054330-COMPLETE SPECIFICATION [28-12-2019(online)].pdf 2019-12-28
11 Abstract1.jpg 2020-01-04
12 201921054330-ORIGINAL UR 6(1A) FORM 26-140120.pdf 2020-01-16
13 201921054330-Proof of Right [30-11-2020(online)].pdf 2020-11-30