US 12,244,632 B2
Systems and methods for identifying and mapping sensitive data on an enterprise
Elgan David Jones, Washington, DC (US); Thomas Langer, Leesburg, VA (US); and Winston Krone, Amsterdam (NL)
Assigned to KIVU CONSULTING, INC., San Francisco, CA (US)
Filed by Kivu Consulting, Inc., San Francisco, CA (US)
Filed on Sep. 1, 2023, as Appl. No. 18/241,685.
Application 18/241,685 is a continuation of application No. 17/395,713, filed on Aug. 6, 2021, granted, now 11,750,641.
Application 17/395,713 is a continuation of application No. 16/832,779, filed on Mar. 27, 2020, granted, now 11,089,046, issued on Aug. 10, 2021.
Application 16/832,779 is a continuation of application No. 15/684,583, filed on Aug. 23, 2017, granted, now 10,609,065, issued on Mar. 31, 2020.
Claims priority of provisional application 62/381,228, filed on Aug. 30, 2016.
Prior Publication US 2024/0154989 A1, May 9, 2024
This patent is subject to a terminal disclaimer.
Int. Cl. H04L 29/06 (2006.01); G06F 21/57 (2013.01); G06F 21/62 (2013.01); H04L 9/40 (2022.01); G06F 21/10 (2013.01); G06F 21/16 (2013.01)
CPC H04L 63/1433 (2013.01) [G06F 21/577 (2013.01); G06F 21/6218 (2013.01); H04L 63/1425 (2013.01); G06F 21/106 (2023.08); G06F 21/16 (2013.01); G06F 2221/034 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A computer-implemented method for sensitive data analysis, the method comprising:
receiving sensitive data parameters associated with an enterprise;
configuring a tool based on the sensitive data parameters;
distributing the tool to a plurality of computing systems in the enterprise, wherein at each computing system the tool is executed for:
scanning, in a stealth mode in a background of the computing system, the computing system to identify a plurality of files associated with the computing system,
analyzing each of the plurality of files to identify sensitive files including sensitive data matching at least one of the sensitive data parameters,
assigning an identifier to each of the sensitive files,
transferring each of the sensitive files to a data store that stores each of the sensitive files along with the corresponding identifier,
deleting each of the identified sensitive files from the computing system,
generating a sensitive data report including file information associated with each of the identified sensitive files,
sending the sensitive data report to the data store; and
deleting the tool from the computing system after the sensitive data report is sent to the data store;
obtaining a plurality of sensitive data reports associated with the plurality of computing systems from the data store, each sensitive data report associated with one of the plurality of computing systems;
generating a sensitive data map for the enterprise, the sensitive data map identifying each of the plurality of computing systems in the enterprise and the file information associated with each of the plurality of computing systems; and
causing an alert including the sensitive data map to be provided to an enterprise management system.