Sign In to Follow Application
View All Documents & Correspondence

Systems And Methods For Detecting Data Leakage In An Enterprise

Abstract: Systems and methods for detecting data leakage in an enterprise are described. In one implementation, the method comprises receiving files metadata from at least one device associated with the enterprise. The files metadata comprises a plurality of file parameters. Further, the method comprises processing the files metadata to generate indexed metadata. The indexed metadata comprises at least one of the plurality of file parameters. Further, the method comprises analyzing the indexed metadata based on predefined leakage patterns to detect the data leakage. Figure 2

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
08 December 2014
Publication Number
52/2014
Publication Type
INA
Invention Field
COMPUTER SCIENCE
Status
Email
Parent Application
Patent Number
Legal Status
Grant Date
2023-05-17
Renewal Date

Applicants

WIPRO LIMITED
Doddakannelli, Sarjapur Road, Bangalore 560035, Karnataka, India.

Inventors

1. CHETAN GANATRA
11, Priyesh Apartment, Rambaug Lane 2, Kalyan West, Maharashtra, 421301, India

Specification

CLIAMS:We claim:
1. A computer-implemented method for detecting data leakage in an enterprise, the method comprising:
receiving, by a processor, files metadata from at least one device associated with the enterprise, wherein the files metadata comprises a plurality of file parameters;
processing, by the processor, the files metadata to generate indexed metadata, wherein the indexed metadata comprises at least one of the plurality of file parameters; and
analyzing, by the processor, the indexed metadata based on predefined leakage patterns to detect the data leakage.

2. The method of claim 1 further comprises rendering a data leakage report indicating data leakage in the enterprise, wherein the data leakage report comprises detected data leaks, potential data leaks, suspicious activities, and flagged activities.

3. The method of claim 1, wherein the plurality of files parameter comprises at least one of type of file, file location, modification date, creation date, access date, timestamps maintained within a file system, file owner, file attributes, flags, or system identifier.

4. The method of claim 1, wherein the predefined leakage patterns comprises data anomalies, unauthorized access to files, deviation from standard activities, detected data leakage incidents, replication of a file in multiple devices and sequence of file system activities on an individual device and across multiple devices.

5. The method of claim 1, wherein receiving the files metadata further comprises:
transmitting authentication parameters to the at least one device;
establishing a connection with the at least one device based on the authentication parameters; and
receiving the files metadata from the at least one device based on analysis parameters.
6. The method of claim 1, wherein analyzing the indexed metadata further comprises:
generating a view of user data activities comprising data timelines and activities; and
mapping the view with the predefined leakage patterns to detect the data leakage.

7. The method of claim 1 further comprises receiving file content, for further analysis, from the at least one device upon detecting the data leakage.

8. The method of claim 1 further comprises:
tracking a data movement pattern, for a user in the enterprise, based on the indexed metadata; and
creating a user profile, based on the data movement pattern, to indicate user behavior in the enterprise.

9. A system for detecting data leakage in an enterprise, the system comprising:
a processor operatively coupled to a memory device, wherein the processor is configured to execute instructions stored in the memory device to perform operations comprising:
receiving files metadata from at least one device associated with the enterprise, wherein the files metadata comprises a plurality of file parameters;
processing the files metadata to generate indexed metadata, wherein the indexed metadata comprises at least one of the plurality of file parameters; and
analyzing the indexed metadata based on predefined leakage patterns to detect the data leakage.

8. The system of claim 9, wherein the operations further comprise rendering a data leakage report indicating data leakage in the enterprise, wherein the data leakage report comprises detected data leaks, potential data leaks, suspicious activities, and flagged activities.

11. The system of claim 9, wherein the plurality of files parameter comprises at least one of type of file, file location, modification date, creation date, access date, timestamps maintained within a file system, file owner, file attributes, flags, or system identifier.

12. The system of claim 9, wherein the predefined leakage patterns comprises data anomalies, unauthorized access to files, deviation from standard activities, detected data leakage incidents, replication of a file in multiple devices and sequence of file system activities on an individual device and across multiple devices.

13. The system of claim 9, wherein the operations of receiving the files metadata further comprises:
transmitting authentication parameters to the at least one device;
establishing a connection with the at least one device based on the authentication parameters; and
receiving the files metadata from the at least one device based on analysis parameters.

14. The system of claim 9, wherein operations of analyzing the indexed metadata further comprises:
generating a view of user data activities comprising data timelines and activities; and
mapping the view with the predefined leakage patterns to detect the data leakage.

15. The system of claim 9, wherein the operations further comprise receiving file content, for further analysis, from the at least one device upon detecting the data leakage.

16. The system of claim 9, wherein the operations further comprise:
tracking a data movement pattern, for a user in the enterprise, based on the indexed metadata; and
creating a user profile, based on the data movement pattern, to indicate user behavior in the enterprise.

17. A non-transitory computer-readable medium storing instructions for detecting data leakage in an enterprise that, when executed by a processor, cause the processor to perform operations comprising:
receiving files metadata from at least one device associated with the enterprise, wherein the files metadata comprises a plurality of file parameters;
processing the files metadata to generate indexed metadata, wherein the indexed metadata comprises at least one of the plurality of file parameters; and
analyzing the indexed metadata based on predefined leakage patterns to detect the data leakage.

Dated this 8th day of December 2014
Shwetha A Chimalgi
Of K&S Partners
Agent for the Applicant
,TagSPECI:TECHNICAL FIELD
The present subject matter relates to detection of data leakage, and, particularly but not exclusively, to systems and methods for detecting data leakage in an enterprise.

Documents

Orders

Section Controller Decision Date

Application Documents

# Name Date
1 6173-CHE-2014 FORM-9 08-12-2014.pdf 2014-12-08
1 6173-CHE-2014-IntimationOfGrant17-05-2023.pdf 2023-05-17
2 6173-CHE-2014 FORM-18 08-12-2014.pdf 2014-12-08
2 6173-CHE-2014-PatentCertificate17-05-2023.pdf 2023-05-17
3 IP29193-spec.pdf 2014-12-16
3 6173-CHE-2014-FORM-26 [16-05-2023(online)].pdf 2023-05-16
4 IP29193-fig.pdf 2014-12-16
4 6173-CHE-2014-PETITION UNDER RULE 137 [16-05-2023(online)].pdf 2023-05-16
5 FORM 5-IP29193.pdf 2014-12-16
5 6173-CHE-2014-Written submissions and relevant documents [16-05-2023(online)].pdf 2023-05-16
6 FORM 3-IP29193.pdf 2014-12-16
6 6173-CHE-2014-AMENDED DOCUMENTS [03-04-2023(online)].pdf 2023-04-03
7 6173CHE2014_CertifiedCopyRequest.pdf 2014-12-16
7 6173-CHE-2014-Correspondence to notify the Controller [03-04-2023(online)].pdf 2023-04-03
8 abstract 6173-CHE-2014.jpg 2014-12-17
8 6173-CHE-2014-FORM 13 [03-04-2023(online)].pdf 2023-04-03
9 6173-CHE-2014 POWER OF ATTORNEY 22-05-2015.pdf 2015-05-22
9 6173-CHE-2014-POA [03-04-2023(online)].pdf 2023-04-03
10 6173-CHE-2014 FORM-1 22-05-2015.pdf 2015-05-22
10 6173-CHE-2014-US(14)-HearingNotice-(HearingDate-01-05-2023).pdf 2023-03-20
11 6173-CHE-2014 CORRESPONDENCE OTHERS 22-05-2015.pdf 2015-05-22
11 6173-CHE-2014-FER_SER_REPLY [27-01-2020(online)].pdf 2020-01-27
12 6173-CHE-2014-FER.pdf 2019-07-29
12 6173-CHE-2014-FORM 3 [27-01-2020(online)].pdf 2020-01-27
13 6173-CHE-2014-Information under section 8(2) [27-01-2020(online)].pdf 2020-01-27
14 6173-CHE-2014-FER.pdf 2019-07-29
14 6173-CHE-2014-FORM 3 [27-01-2020(online)].pdf 2020-01-27
15 6173-CHE-2014 CORRESPONDENCE OTHERS 22-05-2015.pdf 2015-05-22
15 6173-CHE-2014-FER_SER_REPLY [27-01-2020(online)].pdf 2020-01-27
16 6173-CHE-2014 FORM-1 22-05-2015.pdf 2015-05-22
16 6173-CHE-2014-US(14)-HearingNotice-(HearingDate-01-05-2023).pdf 2023-03-20
17 6173-CHE-2014-POA [03-04-2023(online)].pdf 2023-04-03
17 6173-CHE-2014 POWER OF ATTORNEY 22-05-2015.pdf 2015-05-22
18 6173-CHE-2014-FORM 13 [03-04-2023(online)].pdf 2023-04-03
18 abstract 6173-CHE-2014.jpg 2014-12-17
19 6173CHE2014_CertifiedCopyRequest.pdf 2014-12-16
19 6173-CHE-2014-Correspondence to notify the Controller [03-04-2023(online)].pdf 2023-04-03
20 FORM 3-IP29193.pdf 2014-12-16
20 6173-CHE-2014-AMENDED DOCUMENTS [03-04-2023(online)].pdf 2023-04-03
21 FORM 5-IP29193.pdf 2014-12-16
21 6173-CHE-2014-Written submissions and relevant documents [16-05-2023(online)].pdf 2023-05-16
22 IP29193-fig.pdf 2014-12-16
22 6173-CHE-2014-PETITION UNDER RULE 137 [16-05-2023(online)].pdf 2023-05-16
23 IP29193-spec.pdf 2014-12-16
23 6173-CHE-2014-FORM-26 [16-05-2023(online)].pdf 2023-05-16
24 6173-CHE-2014-PatentCertificate17-05-2023.pdf 2023-05-17
24 6173-CHE-2014 FORM-18 08-12-2014.pdf 2014-12-08
25 6173-CHE-2014 FORM-9 08-12-2014.pdf 2014-12-08
25 6173-CHE-2014-IntimationOfGrant17-05-2023.pdf 2023-05-17

Search Strategy

1 2019-07-2916-41-27_29-07-2019.pdf

ERegister / Renewals

3rd: 02 Aug 2023

From 08/12/2016 - To 08/12/2017

4th: 02 Aug 2023

From 08/12/2017 - To 08/12/2018

5th: 02 Aug 2023

From 08/12/2018 - To 08/12/2019

6th: 02 Aug 2023

From 08/12/2019 - To 08/12/2020

7th: 02 Aug 2023

From 08/12/2020 - To 08/12/2021

8th: 02 Aug 2023

From 08/12/2021 - To 08/12/2022

9th: 02 Aug 2023

From 08/12/2022 - To 08/12/2023

10th: 02 Dec 2023

From 08/12/2023 - To 08/12/2024

11th: 02 Dec 2024

From 08/12/2024 - To 08/12/2025