Abstract: Systems and methods for detecting data leakage in an enterprise are described. In one implementation, the method comprises receiving files metadata from at least one device associated with the enterprise. The files metadata comprises a plurality of file parameters. Further, the method comprises processing the files metadata to generate indexed metadata. The indexed metadata comprises at least one of the plurality of file parameters. Further, the method comprises analyzing the indexed metadata based on predefined leakage patterns to detect the data leakage. Figure 2
CLIAMS:We claim:
1. A computer-implemented method for detecting data leakage in an enterprise, the method comprising:
receiving, by a processor, files metadata from at least one device associated with the enterprise, wherein the files metadata comprises a plurality of file parameters;
processing, by the processor, the files metadata to generate indexed metadata, wherein the indexed metadata comprises at least one of the plurality of file parameters; and
analyzing, by the processor, the indexed metadata based on predefined leakage patterns to detect the data leakage.
2. The method of claim 1 further comprises rendering a data leakage report indicating data leakage in the enterprise, wherein the data leakage report comprises detected data leaks, potential data leaks, suspicious activities, and flagged activities.
3. The method of claim 1, wherein the plurality of files parameter comprises at least one of type of file, file location, modification date, creation date, access date, timestamps maintained within a file system, file owner, file attributes, flags, or system identifier.
4. The method of claim 1, wherein the predefined leakage patterns comprises data anomalies, unauthorized access to files, deviation from standard activities, detected data leakage incidents, replication of a file in multiple devices and sequence of file system activities on an individual device and across multiple devices.
5. The method of claim 1, wherein receiving the files metadata further comprises:
transmitting authentication parameters to the at least one device;
establishing a connection with the at least one device based on the authentication parameters; and
receiving the files metadata from the at least one device based on analysis parameters.
6. The method of claim 1, wherein analyzing the indexed metadata further comprises:
generating a view of user data activities comprising data timelines and activities; and
mapping the view with the predefined leakage patterns to detect the data leakage.
7. The method of claim 1 further comprises receiving file content, for further analysis, from the at least one device upon detecting the data leakage.
8. The method of claim 1 further comprises:
tracking a data movement pattern, for a user in the enterprise, based on the indexed metadata; and
creating a user profile, based on the data movement pattern, to indicate user behavior in the enterprise.
9. A system for detecting data leakage in an enterprise, the system comprising:
a processor operatively coupled to a memory device, wherein the processor is configured to execute instructions stored in the memory device to perform operations comprising:
receiving files metadata from at least one device associated with the enterprise, wherein the files metadata comprises a plurality of file parameters;
processing the files metadata to generate indexed metadata, wherein the indexed metadata comprises at least one of the plurality of file parameters; and
analyzing the indexed metadata based on predefined leakage patterns to detect the data leakage.
8. The system of claim 9, wherein the operations further comprise rendering a data leakage report indicating data leakage in the enterprise, wherein the data leakage report comprises detected data leaks, potential data leaks, suspicious activities, and flagged activities.
11. The system of claim 9, wherein the plurality of files parameter comprises at least one of type of file, file location, modification date, creation date, access date, timestamps maintained within a file system, file owner, file attributes, flags, or system identifier.
12. The system of claim 9, wherein the predefined leakage patterns comprises data anomalies, unauthorized access to files, deviation from standard activities, detected data leakage incidents, replication of a file in multiple devices and sequence of file system activities on an individual device and across multiple devices.
13. The system of claim 9, wherein the operations of receiving the files metadata further comprises:
transmitting authentication parameters to the at least one device;
establishing a connection with the at least one device based on the authentication parameters; and
receiving the files metadata from the at least one device based on analysis parameters.
14. The system of claim 9, wherein operations of analyzing the indexed metadata further comprises:
generating a view of user data activities comprising data timelines and activities; and
mapping the view with the predefined leakage patterns to detect the data leakage.
15. The system of claim 9, wherein the operations further comprise receiving file content, for further analysis, from the at least one device upon detecting the data leakage.
16. The system of claim 9, wherein the operations further comprise:
tracking a data movement pattern, for a user in the enterprise, based on the indexed metadata; and
creating a user profile, based on the data movement pattern, to indicate user behavior in the enterprise.
17. A non-transitory computer-readable medium storing instructions for detecting data leakage in an enterprise that, when executed by a processor, cause the processor to perform operations comprising:
receiving files metadata from at least one device associated with the enterprise, wherein the files metadata comprises a plurality of file parameters;
processing the files metadata to generate indexed metadata, wherein the indexed metadata comprises at least one of the plurality of file parameters; and
analyzing the indexed metadata based on predefined leakage patterns to detect the data leakage.
Dated this 8th day of December 2014
Shwetha A Chimalgi
Of K&S Partners
Agent for the Applicant
,TagSPECI:TECHNICAL FIELD
The present subject matter relates to detection of data leakage, and, particularly but not exclusively, to systems and methods for detecting data leakage in an enterprise.
| Section | Controller | Decision Date |
|---|---|---|
| # | Name | Date |
|---|---|---|
| 1 | 6173-CHE-2014 FORM-9 08-12-2014.pdf | 2014-12-08 |
| 1 | 6173-CHE-2014-IntimationOfGrant17-05-2023.pdf | 2023-05-17 |
| 2 | 6173-CHE-2014 FORM-18 08-12-2014.pdf | 2014-12-08 |
| 2 | 6173-CHE-2014-PatentCertificate17-05-2023.pdf | 2023-05-17 |
| 3 | IP29193-spec.pdf | 2014-12-16 |
| 3 | 6173-CHE-2014-FORM-26 [16-05-2023(online)].pdf | 2023-05-16 |
| 4 | IP29193-fig.pdf | 2014-12-16 |
| 4 | 6173-CHE-2014-PETITION UNDER RULE 137 [16-05-2023(online)].pdf | 2023-05-16 |
| 5 | FORM 5-IP29193.pdf | 2014-12-16 |
| 5 | 6173-CHE-2014-Written submissions and relevant documents [16-05-2023(online)].pdf | 2023-05-16 |
| 6 | FORM 3-IP29193.pdf | 2014-12-16 |
| 6 | 6173-CHE-2014-AMENDED DOCUMENTS [03-04-2023(online)].pdf | 2023-04-03 |
| 7 | 6173CHE2014_CertifiedCopyRequest.pdf | 2014-12-16 |
| 7 | 6173-CHE-2014-Correspondence to notify the Controller [03-04-2023(online)].pdf | 2023-04-03 |
| 8 | abstract 6173-CHE-2014.jpg | 2014-12-17 |
| 8 | 6173-CHE-2014-FORM 13 [03-04-2023(online)].pdf | 2023-04-03 |
| 9 | 6173-CHE-2014 POWER OF ATTORNEY 22-05-2015.pdf | 2015-05-22 |
| 9 | 6173-CHE-2014-POA [03-04-2023(online)].pdf | 2023-04-03 |
| 10 | 6173-CHE-2014 FORM-1 22-05-2015.pdf | 2015-05-22 |
| 10 | 6173-CHE-2014-US(14)-HearingNotice-(HearingDate-01-05-2023).pdf | 2023-03-20 |
| 11 | 6173-CHE-2014 CORRESPONDENCE OTHERS 22-05-2015.pdf | 2015-05-22 |
| 11 | 6173-CHE-2014-FER_SER_REPLY [27-01-2020(online)].pdf | 2020-01-27 |
| 12 | 6173-CHE-2014-FER.pdf | 2019-07-29 |
| 12 | 6173-CHE-2014-FORM 3 [27-01-2020(online)].pdf | 2020-01-27 |
| 13 | 6173-CHE-2014-Information under section 8(2) [27-01-2020(online)].pdf | 2020-01-27 |
| 14 | 6173-CHE-2014-FER.pdf | 2019-07-29 |
| 14 | 6173-CHE-2014-FORM 3 [27-01-2020(online)].pdf | 2020-01-27 |
| 15 | 6173-CHE-2014 CORRESPONDENCE OTHERS 22-05-2015.pdf | 2015-05-22 |
| 15 | 6173-CHE-2014-FER_SER_REPLY [27-01-2020(online)].pdf | 2020-01-27 |
| 16 | 6173-CHE-2014 FORM-1 22-05-2015.pdf | 2015-05-22 |
| 16 | 6173-CHE-2014-US(14)-HearingNotice-(HearingDate-01-05-2023).pdf | 2023-03-20 |
| 17 | 6173-CHE-2014-POA [03-04-2023(online)].pdf | 2023-04-03 |
| 17 | 6173-CHE-2014 POWER OF ATTORNEY 22-05-2015.pdf | 2015-05-22 |
| 18 | 6173-CHE-2014-FORM 13 [03-04-2023(online)].pdf | 2023-04-03 |
| 18 | abstract 6173-CHE-2014.jpg | 2014-12-17 |
| 19 | 6173CHE2014_CertifiedCopyRequest.pdf | 2014-12-16 |
| 19 | 6173-CHE-2014-Correspondence to notify the Controller [03-04-2023(online)].pdf | 2023-04-03 |
| 20 | FORM 3-IP29193.pdf | 2014-12-16 |
| 20 | 6173-CHE-2014-AMENDED DOCUMENTS [03-04-2023(online)].pdf | 2023-04-03 |
| 21 | FORM 5-IP29193.pdf | 2014-12-16 |
| 21 | 6173-CHE-2014-Written submissions and relevant documents [16-05-2023(online)].pdf | 2023-05-16 |
| 22 | IP29193-fig.pdf | 2014-12-16 |
| 22 | 6173-CHE-2014-PETITION UNDER RULE 137 [16-05-2023(online)].pdf | 2023-05-16 |
| 23 | IP29193-spec.pdf | 2014-12-16 |
| 23 | 6173-CHE-2014-FORM-26 [16-05-2023(online)].pdf | 2023-05-16 |
| 24 | 6173-CHE-2014-PatentCertificate17-05-2023.pdf | 2023-05-17 |
| 24 | 6173-CHE-2014 FORM-18 08-12-2014.pdf | 2014-12-08 |
| 25 | 6173-CHE-2014 FORM-9 08-12-2014.pdf | 2014-12-08 |
| 25 | 6173-CHE-2014-IntimationOfGrant17-05-2023.pdf | 2023-05-17 |
| 1 | 2019-07-2916-41-27_29-07-2019.pdf |