白丝美女被狂躁免费视频网站,500av导航大全精品,yw.193.cnc爆乳尤物未满,97se亚洲综合色区,аⅴ天堂中文在线网官网

Systems and methods for data loss prevention of unidentifiable and unsupported object types

專利號(hào)
US10079835B1
公開(kāi)日期
2018-09-18
申請(qǐng)人
Symantec Corporation(US CA Mountain View)
發(fā)明人
Dhananjay Dodke; Sumesh Jaiswal; Amit Dhotre; Vipul Goel
IPC分類
H04L29/06; G06F21/10
技術(shù)領(lǐng)域
data,or,sensitive,prevention,may,loss,in,computing,flagging,module
地域: Mountain View

摘要

A computer-implemented method for data loss prevention of unidentifiable and unsupported object types may include (1) monitoring, through at least one filter, data input to an application during execution, (2) scanning, through a data loss prevention scanner, the data input to the application to detect whether the data includes sensitive data that is protected by a data loss prevention policy, (3) flagging, based on the scanning, the application as having accessed the sensitive data that is protected by the data loss prevention policy, (4) detecting that the application is requesting to output a data object in a format that obscures underlying content, and (5) performing, by a data loss prevention program, a remedial action to prevent loss of the sensitive data based on both flagging the application and detecting that the application is requesting to output the data object in the format that obscures underlying content.

說(shuō)明書(shū)

In general, performance module 112 may tag the data object and then allow the data object to be written to the file system, network, and/or operating system clipboard, after which the data object may be prevented from leaking outside of a corresponding organization or enterprise at a further or different layer of filters, interceptors, and/or checkpoints (which may reference the tag to determine that the data object should not be permitted to be transmitted outside of the organization). Similarly, in some examples the application may write or transmit the data object to another application. In these examples, the new target application, such as application 250, may inherit the classification of the source application, such as application 230 (i.e., if the source application was flagged as having accessed sensitive data then the target application receiving the data object may be flagged too in a parallel manner).

In further examples, the attempt to output the data object may trigger one or more attempts to convert the data object from the obfuscated format to a computer-readable format, such as by performing optical character recognition. Upon performing optical character recognition, the data loss prevention system may then proceed as if the underlying text had been extracted from a conventional document file. In other examples, detecting the presence of sensitive data within a multimedia or obfuscated format may trigger or indicate a notification that a user potentially intended to circumvent the data loss prevention system and leak sensitive data.

權(quán)利要求

1
微信群二維碼
意見(jiàn)反饋