US 11,748,331 B2
Verifying structured data
Parth Shukla, Pfaffikon (CH)
Assigned to Google LLC, Mountain View, CA (US)
Filed by Google LLC, Mountain View, CA (US)
Filed on Aug. 25, 2020, as Appl. No. 17/2,744.
Application 17/002,744 is a continuation of application No. 15/790,453, filed on Oct. 23, 2017, granted, now 10,783,138.
Prior Publication US 2020/0387499 A1, Dec. 10, 2020
Int. Cl. G06F 16/23 (2019.01); G06F 21/55 (2013.01); G06F 21/62 (2013.01); G06F 21/57 (2013.01); G06F 21/51 (2013.01)
CPC G06F 16/2365 (2019.01) [G06F 21/552 (2013.01); G06F 21/6227 (2013.01); G06F 21/51 (2013.01); G06F 21/572 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A method comprising:
receiving, at data processing hardware, an indication of a possible instance of malicious activity for an element of structured data, the indication indicating that an activity of the element of structured data deviates from an assessment standard comprising attributes corresponding to the structured data;
identifying, by the data processing hardware, that the possible instance of malicious activity for the element of structured data differs from the assessment standard by more than a difference threshold;
in response to identifying that the possible instance of malicious activity for the element of structured data differs from the assessment standard by more than the difference threshold, identifying, by the data processing hardware, a plurality of other instances of activity for the element of structured data that deviated from the assessment standard, the plurality of other instances of activity stored in a registry in communication with the data processing hardware;
determining, by the data processing hardware, whether the possible instance of malicious activity for the element of structured data matches other instances of activity for the element of structured data that deviated from the assessment standard; and
when the possible instance of malicious activity for the element of structured data fails to match other instances of activity for the element of structured data, communicating, by the data processing hardware, the possible instance of malicious activity for the element of structured data as a security finding to an entity overseeing the structured data.