白丝美女被狂躁免费视频网站,500av导航大全精品,yw.193.cnc爆乳尤物未满,97se亚洲综合色区,аⅴ天堂中文在线网官网

Systems and methods for data loss prevention of unidentifiable and unsupported object types

專利號
US10079835B1
公開日期
2018-09-18
申請人
Symantec Corporation(US CA Mountain View)
發(fā)明人
Dhananjay Dodke; Sumesh Jaiswal; Amit Dhotre; Vipul Goel
IPC分類
H04L29/06; G06F21/10
技術(shù)領(lǐng)域
data,or,sensitive,prevention,may,loss,in,computing,flagging,module
地域: Mountain View

摘要

A computer-implemented method for data loss prevention of unidentifiable and unsupported object types may include (1) monitoring, through at least one filter, data input to an application during execution, (2) scanning, through a data loss prevention scanner, the data input to the application to detect whether the data includes sensitive data that is protected by a data loss prevention policy, (3) flagging, based on the scanning, the application as having accessed the sensitive data that is protected by the data loss prevention policy, (4) detecting that the application is requesting to output a data object in a format that obscures underlying content, and (5) performing, by a data loss prevention program, a remedial action to prevent loss of the sensitive data based on both flagging the application and detecting that the application is requesting to output the data object in the format that obscures underlying content.

說明書

In performing these calculations, flagging module 108 may also weight some sensitive data more heavily than other sensitive data such that a single hit on a more sensitive item of data may increase a running total closer to the threshold more than a single hit on a less sensitive item of data. In these examples, flagging module 108 and/or system 200 as a whole may specify both which items of data constitutes sensitive data that is protected by the data loss prevention system and also specific values or formulas that define weights for one or more of these items of sensitive data. Flagging module 108 may also base the determination of whether to flag the application on a rate of accessing sensitive data over a unit of time (e.g., a duration of time, acceleration, jerk, or other n-order measurement), such as by measuring the rate, acceleration, or jerk against a corresponding threshold.

In one embodiment, the application remains flagged during execution as having accessed the sensitive data until a process corresponding to the application is terminated. In other words, termination of the application may guarantee that the ability of the application to access sensitive data no longer exists such that the application may be trusted again. In other examples, the application may remain flagged until the clearing, blocking, deleting, overwriting, and/or invalidating of one or more areas, units, and/or pages of memory that the application accessed, to which the application possessed access, and/or to which the application wrote the sensitive data. In these examples, the ability of the application to access the sensitive data may expire without the process corresponding to the application also expiring, because the memory location where the sensitive data was stored or accessible has been deleted or otherwise made inaccessible.

權(quán)利要求

1
微信群二維碼
意見反饋