US 12,010,124 B2
Methods and systems for prevention of vendor data abuse
Supreeth Hosur Nagesh Rao, Cupertino, CA (US); Navindra Yadav, Cupertino, CA (US); Ravi Sankuratri, Cupertino, CA (US); Alok Lalit Wadhwa, Milipitas, CA (US); Aria Rahadian, San Jose, CA (US); Bharathwaj Sankara Viswanathan, Mountain View, CA (US); Brady Schulman, Milford, NH (US); Matthew Finn, Lebanon, GA (US); Ravi Shanker Prasad, Fremont, CA (US); Vasil Dochkov Yordanov, San Jose, CA (US); Yiwei Wang, San Jose, CA (US); and Zhiwen Zhang, San Jose, CA (US)
Filed by Supreeth Hosur Nagesh Rao, Cupertino, CA (US); Navindra Yadav, Cupertino, CA (US); Ravi Sankuratri, Cupertino, CA (US); Alok Lalit Wadhwa, Milipitas, CA (US); Aria Rahadian, San Jose, CA (US); Bharathwaj Sankara Viswanathan, Mountain View, CA (US); Brady Schulman, Milford, NH (US); Matthew Finn, Lebanon, GA (US); Ravi Shanker Prasad, Fremont, CA (US); Vasil Dochkov Yordanov, San Jose, CA (US); Yiwei Wang, San Jose, CA (US); and Zhiwen Zhang, San Jose, CA (US)
Filed on Jun. 1, 2021, as Appl. No. 17/335,932.
Claims priority of provisional application 63/153,362, filed on Feb. 24, 2021.
Prior Publication US 2022/0269815 A1, Aug. 25, 2022
Int. Cl. H04L 9/40 (2022.01); G06F 9/54 (2006.01); G06F 16/23 (2019.01); G06F 21/57 (2013.01); G06F 21/60 (2013.01); G06F 21/62 (2013.01)
CPC H04L 63/1416 (2013.01) [G06F 9/541 (2013.01); G06F 16/2379 (2019.01); G06F 21/577 (2013.01); G06F 21/604 (2013.01); G06F 21/6245 (2013.01); H04L 63/0209 (2013.01); H04L 63/1425 (2013.01); H04L 63/1466 (2013.01); H04L 63/20 (2013.01); G06F 2221/034 (2013.01)] 12 Claims
OG exemplary drawing
 
1. A computerized method for automatically identifying and solving for vendor data abuse in an enterprise network, comprising:
implementing a vendor detection at one or more gateways of the enterprise network;
mapping a set of data along with any associated data attributes of the set of data that are being shared with a vendor via the one or more gateways;
detecting and identifying an access anomaly with respect to the set of data associated with a vendor access; and
implementing a specified data minimization process to the access anomaly,
wherein the data minimization process is applied for every vendor sharing agreement engaged in by the enterprise network that is associated with the vendor, and
wherein data minimization is implemented by prohibiting a vendor access to any sensitive data in the enterprise network.