白丝美女被狂躁免费视频网站,500av导航大全精品,yw.193.cnc爆乳尤物未满,97se亚洲综合色区,аⅴ天堂中文在线网官网

Systems and methods for data loss prevention of unidentifiable and unsupported object types

專(zhuān)利號(hào)
US10079835B1
公開(kāi)日期
2018-09-18
申請(qǐng)人
Symantec Corporation(US CA Mountain View)
發(fā)明人
Dhananjay Dodke; Sumesh Jaiswal; Amit Dhotre; Vipul Goel
IPC分類(lèi)
H04L29/06; G06F21/10
技術(shù)領(lǐng)域
data,or,sensitive,prevention,may,loss,in,computing,flagging,module
地域: Mountain View

摘要

A computer-implemented method for data loss prevention of unidentifiable and unsupported object types may include (1) monitoring, through at least one filter, data input to an application during execution, (2) scanning, through a data loss prevention scanner, the data input to the application to detect whether the data includes sensitive data that is protected by a data loss prevention policy, (3) flagging, based on the scanning, the application as having accessed the sensitive data that is protected by the data loss prevention policy, (4) detecting that the application is requesting to output a data object in a format that obscures underlying content, and (5) performing, by a data loss prevention program, a remedial action to prevent loss of the sensitive data based on both flagging the application and detecting that the application is requesting to output the data object in the format that obscures underlying content.

說(shuō)明書(shū)

FIG. 4 illustrates an example of data 232, application 230, and a data object 212. In the example of FIG. 4, data 232 may refer to a medical report, which was mailed on 25 Mar. 2016. As further shown in this figure, data 232 may also include sensitive data 234, which may further include a Social Security number, a credit card (e.g., VISA) number, and a telephone number. The arrow from data 232 to application 230 indicates that monitoring module 104 may monitor the data that application 230 accesses, attempts to access, and/or has authorization or ability to access. In this example, monitoring module 104 may monitor application 230 and thereby detect that application 230 has accessed data 232. Moreover, scanning module 106 may scan data 232 and then detect that data 232 includes sensitive data 234, as further outlined above. In view of the above, flagging module 108 may flag application 230 as having accessed sensitive data. For example, flagging module 108 may determine that the amount of sensitive data accessed by application 230 is greater than the predefined threshold (which may be zero or some other nonzero amount of arbitrary size), as outlined above.

權(quán)利要求

1
微信群二維碼
意見(jiàn)反饋