Systems and methods for managing privacy policy violations

    公开(公告)号:US11941156B1

    公开(公告)日:2024-03-26

    申请号:US17245838

    申请日:2021-04-30

    申请人: GEN DIGITAL INC.

    IPC分类号: G06F40/205 G06F21/62 H04L9/40

    摘要: The disclosed computer-implemented method for managing privacy policy violations may include obtaining, by the computing device, an intermediate representation of a privacy policy, wherein the intermediate representation denotes a formal policy and is generated by extracting the privacy policy in natural language from a website and parsing the privacy policy. The method may also include comparing, by the computing device, behavior of the website against the intermediate representation, thereby detecting at least one violation of the formal policy. The method may further include enforcing, by the computing device, the formal policy at least in part by taking a security action in response to the violation. Various other methods, systems, and computer-readable media are also disclosed.

    SYSTEMS AND METHODS FOR UTILIZING USER PROFILE DATA TO PROTECT AGAINST PHISHING ATTACKS

    公开(公告)号:US20230403298A1

    公开(公告)日:2023-12-14

    申请号:US17805648

    申请日:2022-06-06

    申请人: GEN DIGITAL INC.

    IPC分类号: H04L9/40

    摘要: The disclosed computer-implemented method for utilizing user profile data to protect against phishing attacks may include (i) detecting a target user profile associated services accessed by a network-based application, (ii) determining identifiers associated with each of the services, (iii) extracting, for each of the identifiers, feature vectors describing exploitable screen elements in the network-based application associated with phishing attacks, (iv) updating, based on the feature vectors, previously extracted feature vectors in a data repository storing additional profiles for other users associated with the services, (v) predicting, utilizing a machine-learning model, phishing attack threats for target profile user based on a similarity with the additional profiles, and (vi) performing a security action that protects against the phishing attack threats. Various other methods, systems, and computer-readable media are also disclosed.