Patents Assigned to XOR DATA EXCHANGE, INC
-
Patent number: 10268840Abstract: In some embodiments, a compromised data exchange system may include an interface configured to couple to a network, a processor, and a memory accessible to the processor. The memory may be configured to store instructions that, when executed, cause the processor to extract data from one or more websites using a crawler, detect portions within the data that resemble personally identifying information (PII) data based on PII data patterns using a risk assessment module, and to compare a detected portion to data within a database of disassociated compromised PII data to determine a match using the risk assessment module. The instructions may further cause the processor to selectively assign a risk score to a data item within the database in response to determining the match using a risk scoring module.Type: GrantFiled: August 15, 2016Date of Patent: April 23, 2019Assignee: XOR Data Exchange, Inc.Inventors: Lester Leland Lockhart, III, David Hugh Munson, Gregor R Bonin, Michael Cook
-
Publication number: 20180367639Abstract: Systems and methods are provided for implementing reciprocal data sharing in a data exchange system. Limitations may be placed on the amount of data an exchange member may access based on the amount of data that exchange member has contributed. The system may include determining a data contribution associated with a first member of the data exchange, determining a data access limit for the first member based on the data contribution, and providing data to the first member when the first member has not exceeded the data access limit. In some embodiments, there may be separate data access limits for each member of the data exchange, so that a first member may have different access limits when accessing data from a second member, data from a third member, and data from a fourth member. Further, the system may limit a requester to a type of data that corresponds to the type of data contributed.Type: ApplicationFiled: March 12, 2018Publication date: December 20, 2018Applicant: XOR Data Exchange, Inc.Inventors: Michael Cook, Gregor R. Bonin, Aaron Antonio Rodriguez
-
Patent number: 9917920Abstract: Systems and methods are provided for implementing reciprocal data sharing in a data exchange system. Limitations may be placed on the amount of data an exchange member may access based on the amount of data that exchange member has contributed. The system may include determining a data contribution associated with a first member of the data exchange, determining a limit for the first member based on the data contribution, and providing data to the first member when the first member has not exceeded the limit. In some embodiments, there may be separate limits for each member of the data exchange, so that a first member may have different access limits when accessing data from a second member, data from a third member, and data from a fourth member. Further, the system may limit a requester to a type of data that corresponds to the type of data contributed.Type: GrantFiled: February 24, 2015Date of Patent: March 13, 2018Assignee: XOR DATA EXCHANGE, INCInventors: Michael Cook, Gregor R. Bonin, Aaron Antonio Rodriguez
-
Publication number: 20170161520Abstract: In some embodiments, a compromised data exchange system may include an interface configured to couple to a network, a processor, and a memory accessible to the processor. The memory may be configured to store instructions that, when executed, cause the processor to extract data from one or more websites using a crawler, detect portions within the data that resemble personally identifying information (PII) data based on PII data patterns using a risk assessment module, and to compare a detected portion to data within a database of disassociated compromised PII data to determine a match using the risk assessment module. The instructions may further cause the processor to selectively assign a risk score to a data item within the database in response to determining the match using a risk scoring module.Type: ApplicationFiled: August 15, 2016Publication date: June 8, 2017Applicant: XOR Data Exchange, Inc.Inventors: Lester Leland Lockhart, III, David Hugh Munson, Gregor R. Bonin, Michael Cook
-
Publication number: 20170161746Abstract: In certain embodiments, a compromised data exchange system may include a memory, an input to receive encrypted personal identifying information (PII), and a processor coupled to the input and the memory. The a processor coupled to the interface and the memory, the processor configured to unencrypt the PII and re-encrypt the PII to produce re-encrypted PII data using a different encryption key for each field and to store the re-encrypted PII data as compromised data in the memory. In some embodiments, the processor may be configured to receive PII data to be tested, may unencrypt and re-encrypted the received PII data using the different encryption keys, compare the encrypted PII data to the compromised data, and determine a risk score based in part on the comparison. The risk score may be sent to a destination device, which may be the source of the PII data to be tested.Type: ApplicationFiled: December 4, 2015Publication date: June 8, 2017Applicant: XOR Data Exchange, IncInventors: Michael Cook, Gregor R. Bonin, Aaron Antonio Rodriguez
-
Publication number: 20160248881Abstract: Systems and methods are provided for implementing reciprocal data sharing in a data exchange system. Limitations may be placed on the amount of data an exchange member may access based on the amount of data that exchange member has contributed. The system may include determining a data contribution associated with a first member of the data exchange, determining a limit for the first member based on the data contribution, and providing data to the first member when the first member has not exceeded the limit. In some embodiments, there may be separate limits for each member of the data exchange, so that a first member may have different access limits when accessing data from a second member, data from a third member, and data from a fourth member. Further, the system may limit a requester to a type of data that corresponds to the type of data contributed.Type: ApplicationFiled: February 24, 2015Publication date: August 25, 2016Applicant: XOR DATA EXCHANGE, INCInventors: Michael Cook, Gregor R. Bonin
-
Publication number: 20160164915Abstract: A system includes a processor and a memory accessible to the processor. The memory stores instructions that, when executed by the processor, cause the processor to determine a privacy policy score for one of an application and a website and provide the privacy policy score to a device.Type: ApplicationFiled: December 9, 2014Publication date: June 9, 2016Applicant: XOR DATA EXCHANGE, INCInventor: Michael Cook
-
Publication number: 20150193638Abstract: A system may include an interface configured to couple to a network, and includes a processor and a memory accessible to the processor. The memory may be configured to store instructions that, when executed, cause the processor to process search results corresponding to multiple data owners to selectively filter personally identifiable information (PII) associated with one or more consumers from the set of search results according to data sharing permissions for each of the data owners to produce filtered results. The instructions may further cause the processor to provide the filtered results to a user device through the network.Type: ApplicationFiled: December 9, 2014Publication date: July 9, 2015Applicant: XOR Data Exchange, IncInventor: Michael Cook
-
Publication number: 20150161210Abstract: A system includes a processor and a memory accessible to the processor. The memory may store instructions that, when executed by a processor, cause the processor to receive first data associated with a first owner and second data associated with a second owner from a data warehouse. The memory further includes instructions that, when executed, cause the processor to selectively filter the first data according to first data sharing permissions defined by the first owner to produce first filtered data, selectively filter the second data according to second data sharing permissions defined by the second owner to produce second filtered data, and provide an output including the first filtered data and the second filtered data to a data requester.Type: ApplicationFiled: December 9, 2014Publication date: June 11, 2015Applicant: XOR DATA EXCHANGE, INCInventors: Michael Cook, Brian Ketelsen