The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.
The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.
Patent No.:
Date of Patent:
Jun. 11, 2024
Filed:
Jun. 01, 2021
Supreeth Hosur Nagesh Rao, Cupertino, CA (US);
Navindra Yadav, Cupertino, CA (US);
Ravi Sankuratri, Cupertino, CA (US);
Alok Lalit Wadhwa, Milipitas, CA (US);
Aria Rahadian, San Jose, CA (US);
Bharathwaj Sankara Viswanathan, Mountain View, CA (US);
Brady Schulman, Milford, NH (US);
Matthew Finn, Lebanon, GA (US);
Ravi Shanker Prasad, Fremont, CA (US);
Vasil Dochkov Yordanov, San Jose, CA (US);
Yiwei Wang, San Jose, CA (US);
Zhiwen Zhang, San Jose, CA (US);
Supreeth Hosur Nagesh Rao, Cupertino, CA (US);
Navindra Yadav, Cupertino, CA (US);
Ravi Sankuratri, Cupertino, CA (US);
Alok Lalit Wadhwa, Milipitas, CA (US);
Aria Rahadian, San Jose, CA (US);
Bharathwaj Sankara Viswanathan, Mountain View, CA (US);
Brady Schulman, Milford, NH (US);
Matthew Finn, Lebanon, GA (US);
Ravi Shanker Prasad, Fremont, CA (US);
Vasil Dochkov Yordanov, San Jose, CA (US);
Yiwei Wang, San Jose, CA (US);
Zhiwen Zhang, San Jose, CA (US);
Abstract
In one aspect, a computerized method for automatically identifying and solving for vendor data abuse in an enterprise network, includes the step of implementing a vendor detection at one or more gateways of the enterprise network. The method includes the step of mapping a set of data along with any associated data attributes of the set of data that are being shared with a vendor via the one or more gateways. The method includes the step of detecting and identifying an access anomaly with respect to the set of data associated with a vendor access. The method includes the step of implementing a specified data minimization process to the access anomaly.