Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Reduction of data transmissions based on end-user context

a data transmission and end-user technology, applied in the field of data transmission reduction based on end-user context, can solve the problems of data loss, legal liability, financial consequences, reputational damage, etc., and the incident can be extremely costly, both in terms of reputation and finances, to the employer

Active Publication Date: 2022-06-30
PROOFPOINT INC
View PDF5 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

The patent text describes a system and technique for monitoring and managing user activities on endpoint devices to prevent insider threats. The system reduces the amount of data transmitted from endpoint devices to a central server, which helps the system perform effectively without needing large amounts of resources. The technique involves implementing relatively simple algorithms and infrastructure, which results in low cost and fast processing. Additionally, the system utilizes cloud computing services, which can provide significant cost savings. The technique also allows for faster data processing by simply dropping unnecessary data, which consumes fewer resources.

Problems solved by technology

In general terms, an insider threat occurs when someone with authorized access to critical information or systems misuses that access—either purposefully or accidentally—resulting in data loss, legal liability, financial consequences, reputational damage, and / or other forms of harm to the person's employer.
Insider threats are on the rise and incidents thereof can be extremely costly, both in terms of reputation and finances, to the employer.
The cost and complexity of operating an effective ITM system (or other system where potentially large amounts of collected may be transmitted a network to some centralized storage or processing facility) can be high due, for example, to the infrastructure and functional demands associated with transmitting, storing and processing large amounts of data.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Reduction of data transmissions based on end-user context
  • Reduction of data transmissions based on end-user context
  • Reduction of data transmissions based on end-user context

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019]FIG. 1 is a schematic block diagram of an exemplary computer network 100 that has a server 102, and a plurality of user endpoint devices 104a, 104b, . . . 104n coupled to one another via a communications network 106 that enables the server 102 and the endpoint devices 104a, 104b . . . 104n to communicate with one another.

[0020]In a typical implementation, the network 100 is configured to operate in a manner such that various data related to user activities at the various endpoint devices 104a, 104b . . . 104n is collected and transmitted to the server 102 for processing and / or storage. In some implementations, a set of user activity data is collected every time any user on the network takes any kind of action on the network. A user action may be, for example, a single mouse click or a single key press on a keyboard at any one of the network endpoint devices 104a, 104b . . . 104n. In response to a user action (also referred to as “user activity”) taking place at one of the netw...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A computer-based method of reducing or limiting data transmissions from a computer to a remote network destination includes receiving an indication, at an agent on a computer, that a recent user activity has occurred at the computer. The indication typically includes data relevant to user context when the user activity occurred. The method further includes determining, with the agent, whether the data relevant to the user's context when the user activity occurred indicates that a change in user context relative to a user activity at the computer immediately prior to the recent user activity and conditioning a transmission of data relevant to the recent user activity from the computer to a remote network destination based on an outcome of the determination.

Description

FIELD OF THE INVENTION[0001]This disclosure relates to the field of reducing data transmissions, more particularly, relates to reducing data transmissions based on end-user context (e.g., at a network endpoint device).BACKGROUND[0002]Various computer-based systems exist that collect large amounts of data from multiple network-connected devices (e.g., network endpoint devices), with the collected data being transmitted across a network to some central location (e.g., a server) to be stored and / or analyzed. One example of this kind of system is an insider threat management system, such as the ObservelT ITM (insider threat management) system, available from Proofpoint, Inc., the applicant of this patent application. In general terms, an insider threat occurs when someone with authorized access to critical information or systems misuses that access—either purposefully or accidentally—resulting in data loss, legal liability, financial consequences, reputational damage, and / or other forms...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(United States)
IPC IPC(8): H04L29/08H04L29/06H04L9/06
CPCH04L67/2842H04L67/22H04L9/0643H04L67/42H04L67/306H04L67/535H04L9/3239H04L67/5682H04L67/568H04L67/01
Inventor BARAK, NIRKREMER, ALEXPIVNIK, TAMIRMESHULAM, YIGALWEINSTEIN, IGALKUIMOV, EFIM
Owner PROOFPOINT INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products