Patents by Inventor Jeremy Turk
Jeremy Turk has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11947708Abstract: In particular embodiments, a sensitive data management system is configured to remove sensitive data after a period of non-use. Credentials used to access remote systems and/or third-party systems are stored with metadata that is updated with each use of the credentials. After a period of non-use, determined based on credential metadata, the credentials are deleted. Personal data retrieved to process a consumer request is stored with metadata that is updated with each use of the personal data. After a period of non-use, determined based on personal data metadata, the personal data is deleted. The personal data is also deleted if the system determines that the process or system that caused the personal data to be retrieved is no longer in use. An encrypted version of personal data may be stored for later use in verifying proper consumer request fulfillment.Type: GrantFiled: December 30, 2022Date of Patent: April 2, 2024Assignee: OneTrust, LLCInventors: Jonathan Blake Brannon, Kevin Jones, Saravanan Pitchaimani, Jeremy Turk
-
Publication number: 20230137172Abstract: In particular embodiments, a sensitive data management system is configured to remove sensitive data after a period of non-use. Credentials used to access remote systems and/or third-party systems are stored with metadata that is updated with each use of the credentials. After a period of non-use, determined based on credential metadata, the credentials are deleted. Personal data retrieved to process a consumer request is stored with metadata that is updated with each use of the personal data. After a period of non-use, determined based on personal data metadata, the personal data is deleted. The personal data is also deleted if the system determines that the process or system that caused the personal data to be retrieved is no longer in use. An encrypted version of personal data may be stored for later use in verifying proper consumer request fulfillment.Type: ApplicationFiled: December 30, 2022Publication date: May 4, 2023Applicant: OneTrust, LLCInventors: Jonathan Blake Brannon, Kevin Jones, Saravanan Pitchaimani, Jeremy Turk
-
Patent number: 11544409Abstract: In particular embodiments, a sensitive data management system is configured to remove sensitive data after a period of non-use. Credentials used to access remote systems and/or third-party systems are stored with metadata that is updated with each use of the credentials. After a period of non-use, determined based on credential metadata, the credentials are deleted. Personal data retrieved to process a consumer request is stored with metadata that is updated with each use of the personal data. After a period of non-use, determined based on personal data metadata, the personal data is deleted. The personal data is also deleted if the system determines that the process or system that caused the personal data to be retrieved is no longer in use. An encrypted version of personal data may be stored for later use in verifying proper consumer request fulfillment.Type: GrantFiled: October 12, 2021Date of Patent: January 3, 2023Assignee: OneTrust, LLCInventors: Jonathan Blake Brannon, Kevin Jones, Saravanan Pitchaimani, Jeremy Turk
-
Publication number: 20220222682Abstract: Embodiments of the present invention provide methods, apparatus, systems, computing devices, computing entities, and/or the like for verifying the identity of a data subject. In one embodiment, a method is provided comprising: receiving, via a browser, a consumer rights request for a data subject for performing an action with regard to personal data associated with the data subject; detecting a state of the browser indicating a location; identifying a law based on the location; determining a level of identity verification required based on the law; generating, based on the level, a GUI by configuring a first prompt on the GUI configured for receiving input for a first type of identity verification; transmitting an instruction to present the GUI; receiving the input for the first type of identity verification; verifying the identity of the data subject based on the input; and responsive to verifying the identity, causing performance of the action.Type: ApplicationFiled: March 31, 2022Publication date: July 14, 2022Applicant: OneTrust, LLCInventors: Jonathan Blake Brannon, Steven W. Finch, Prashanth Sharma, Jeremy Turk, Priya Malhotra, Kevin Jones, Himanshu Arora, Mahashankar Sarangapani, Atul Gupta
-
Patent number: 11295316Abstract: Embodiments of the present invention provide methods, apparatus, systems, computing devices, computing entities, and/or the like for verifying the identity of a data subject. In one embodiment, a method is provided comprising: receiving, via a browser, a consumer rights request for a data subject for performing an action with regard to personal data associated with the data subject; detecting a state of the browser indicating a location; identifying a law based on the location; determining a level of identity verification required based on the law; generating, based on the level, a GUI by configuring a first prompt on the GUI configured for receiving input for a first type of identity verification; transmitting an instruction to present the GUI; receiving the input for the first type of identity verification; verifying the identity of the data subject based on the input; and responsive to verifying the identity, causing performance of the action.Type: GrantFiled: July 23, 2021Date of Patent: April 5, 2022Assignee: OneTrust, LLCInventors: Jonathan Blake Brannon, Steven W. Finch, Prashanth Sharma, Jeremy Turk, Priya Malhotra, Kevin Jones, Himanshu Arora, Mahashankar Sarangapani, Atul Gupta
-
Publication number: 20220035952Abstract: In particular embodiments, a sensitive data management system is configured to remove sensitive data after a period of non-use. Credentials used to access remote systems and/or third-party systems are stored with metadata that is updated with each use of the credentials. After a period of non-use, determined based on credential metadata, the credentials are deleted. Personal data retrieved to process a consumer request is stored with metadata that is updated with each use of the personal data. After a period of non-use, determined based on personal data metadata, the personal data is deleted. The personal data is also deleted if the system determines that the process or system that caused the personal data to be retrieved is no longer in use. An encrypted version of personal data may be stored for later use in verifying proper consumer request fulfillment.Type: ApplicationFiled: October 12, 2021Publication date: February 3, 2022Applicant: OneTrust, LLCInventors: Jonathan Blake Brannon, Kevin Jones, Saravanan Pitchaimani, Jeremy Turk
-
Publication number: 20210350388Abstract: Embodiments of the present invention provide methods, apparatus, systems, computing devices, computing entities, and/or the like for verifying the identity of a data subject. In one embodiment, a method is provided comprising: receiving, via a browser, a consumer rights request for a data subject for performing an action with regard to personal data associated with the data subject; detecting a state of the browser indicating a location; identifying a law based on the location; determining a level of identity verification required based on the law; generating, based on the level, a GUI by configuring a first prompt on the GUI configured for receiving input for a first type of identity verification; transmitting an instruction to present the GUI; receiving the input for the first type of identity verification; verifying the identity of the data subject based on the input; and responsive to verifying the identity, causing performance of the action.Type: ApplicationFiled: July 23, 2021Publication date: November 11, 2021Applicant: OneTrust, LLCInventors: Jonathan Blake Brannon, Steven W. Finch, Prashanth Sharma, Jeremy Turk, Priya Malhotra, Kevin Jones, Himanshu Arora, Mahashankar Sarangapani, Atul Gupta
-
Patent number: 11144675Abstract: In particular embodiments, a sensitive data management system is configured to remove sensitive data after a period of non-use. Credentials used to access remote systems and/or third-party systems are stored with metadata that is updated with each use of the credentials. After a period of non-use, determined based on credential metadata, the credentials are deleted. Personal data retrieved to process a consumer request is stored with metadata that is updated with each use of the personal data. After a period of non-use, determined based on personal data metadata, the personal data is deleted. The personal data is also deleted if the system determines that the process or system that caused the personal data to be retrieved is no longer in use. An encrypted version of personal data may be stored for later use in verifying proper consumer request fulfillment.Type: GrantFiled: March 11, 2021Date of Patent: October 12, 2021Assignee: OneTrust, LLCInventors: Jonathan Blake Brannon, Kevin Jones, Saravanan Pitchaimani, Jeremy Turk
-
Patent number: 11074367Abstract: In various embodiments, before a data subject request can be processed, the data subject's identity may need to be verified. In various embodiments, the system provides a mechanism to automatically detect the type of authentication required for a particular data subject based on the type of Data Subject Access Request being made and automatically issues a request to the data subject to verify their identity against that form of identification. For example, a subject rights request might only require two types of authentication, but a deletion request may require four types of data to verify authentication. The system may automatically detect which is type of authentication is required based on the DSAR and send an appropriate request to the data subject to verify their identity.Type: GrantFiled: January 14, 2021Date of Patent: July 27, 2021Assignee: OneTrust, LLCInventors: Jonathan Blake Brannon, Steven W. Finch, Prashanth Sharma, Jeremy Turk, Priya Malhotra, Kevin Jones, Himanshu Arora, Mahashankar Sarangapani, Atul Gupta
-
Publication number: 20210200902Abstract: In particular embodiments, a sensitive data management system is configured to remove sensitive data after a period of non-use. Credentials used to access remote systems and/or third-party systems are stored with metadata that is updated with each use of the credentials. After a period of non-use, determined based on credential metadata, the credentials are deleted. Personal data retrieved to process a consumer request is stored with metadata that is updated with each use of the personal data. After a period of non-use, determined based on personal data metadata, the personal data is deleted. The personal data is also deleted if the system determines that the process or system that caused the personal data to be retrieved is no longer in use. An encrypted version of personal data may be stored for later use in verifying proper consumer request fulfillment.Type: ApplicationFiled: March 11, 2021Publication date: July 1, 2021Applicant: OneTrust, LLCInventors: Jonathan Blake Brannon, Kevin Jones, Saravanan Pitchaimani, Jeremy Turk
-
Publication number: 20210141931Abstract: In various embodiments, before a data subject request can be processed, the data subject's identity may need to be verified. In various embodiments, the system provides a mechanism to automatically detect the type of authentication required for a particular data subject based on the type of Data Subject Access Request being made and automatically issues a request to the data subject to verify their identity against that form of identification. For example, a subject rights request might only require two types of authentication, but a deletion request may require four types of data to verify authentication. The system may automatically detect which is type of authentication is required based on the DSAR and send an appropriate request to the data subject to verify their identity.Type: ApplicationFiled: January 14, 2021Publication date: May 13, 2021Applicant: OneTrust, LLCInventors: Jonathan Blake Brannon, Steven W. Finch, Prashanth Sharma, Jeremy Turk, Priya Malhotra, Kevin Jones, Himanshu Arora, Mahashankar Sarangapani, Atul Gupta
-
Publication number: 20080064363Abstract: Apparatuses, systems and methods are presented for handling calls. In one embodiment, an emergency call handling system capable of receiving visual information from callers and correlating the visual information to particular incidents is disclosed. To obtain visual information, a call handler may generate and send an electronic mail message to the caller. The caller may reply to the electronic mail message and attach an image captured with, for example, a camera phone. The visual information may then be correlated to the call between the caller and call handler. In addition, unsolicited visual information received by the emergency call handling system may be prioritized, triaged and delivered to the call handler. The visual information may be used to assess an emergency situation. The visual information may be forwarded to emergency service providers.Type: ApplicationFiled: August 7, 2007Publication date: March 13, 2008Inventors: Christopher Salafia, Jeremy Turk, Philip Salafia, Francois Koutchouk
-
Publication number: 20060029188Abstract: Systems and methods are presented for handling calls. In one embodiment of the invention, a call handling system is configured for handling a variety of emergency and/or non emergency related calls. For example, the call handling system may allow a call handler to recognize and respond to certain received call information, such as that information relating to fire, police, emergency medical and/or homeland security. The call handling system comprises a call interface configured for receiving the call information. A processor is communicatively coupled to the call interface and configured for processing the call information to initiate a protocol. This protocol may, as it progresses, be used to generate data for use in a CAD system. The CAD system may subsequently dispatch responders based on the generated data.Type: ApplicationFiled: August 6, 2004Publication date: February 9, 2006Inventors: Christopher Salafia, Jeremy Turk