Patents by Inventor Erik WELLS

Erik WELLS has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20220147645
    Abstract: An approach is disclosed for generating an adjustable ruleset for fingerprinting data. The approach involves, for example, designating a data type as private. The approach also involves collecting private data relating to user from one or more data sources, wherein the private data includes a plurality of attributes that include a private attribute having the private data type. The approach further involves transforming the private attribute based on one or more configured rules for tokenizing the private attribute. The approach also involves generating a token corresponding to transformed private attribute; and initiating storage of the token for subsequent discovery of data having the private data type.
    Type: Application
    Filed: November 12, 2020
    Publication date: May 12, 2022
    Inventors: Matthew Michael LINDE, Max MONTES, Daniel KIM, Erik WELLS
  • Patent number: 10693903
    Abstract: A method and apparatus useful for data risk monitoring and management includes configuration and analysis of data flows to identify and assess risk and compliance to various regulatory standards and business practices. The evaluation of monitored data flows are then further used to identify potential security risks based on deviation from expected flows or compliant handling methods.
    Type: Grant
    Filed: December 26, 2018
    Date of Patent: June 23, 2020
    Assignee: IOR Analytics, LLC.
    Inventors: Matthew Michael Linde, Daniel Jonghoon Kim, Erik Wells
  • Publication number: 20190132351
    Abstract: A method and apparatus useful for data risk monitoring and management includes configuration and analysis of data flows to identify and assess risk and compliance to various regulatory standards and business practices. The evaluation of monitored data flows are then further used to identify potential security risks based on deviation from expected flows or compliant handling methods.
    Type: Application
    Filed: December 26, 2018
    Publication date: May 2, 2019
    Inventors: Matthew Michael LINDE, Daniel Jonghoon KIM, Erik WELLS