白丝美女被狂躁免费视频网站,500av导航大全精品,yw.193.cnc爆乳尤物未满,97se亚洲综合色区,аⅴ天堂中文在线网官网

Systems and methods for data loss prevention of unidentifiable and unsupported object types

專利號
US10079835B1
公開日期
2018-09-18
申請人
Symantec Corporation(US CA Mountain View)
發(fā)明人
Dhananjay Dodke; Sumesh Jaiswal; Amit Dhotre; Vipul Goel
IPC分類
H04L29/06; G06F21/10
技術(shù)領(lǐng)域
data,or,sensitive,prevention,may,loss,in,computing,flagging,module
地域: Mountain View

摘要

A computer-implemented method for data loss prevention of unidentifiable and unsupported object types may include (1) monitoring, through at least one filter, data input to an application during execution, (2) scanning, through a data loss prevention scanner, the data input to the application to detect whether the data includes sensitive data that is protected by a data loss prevention policy, (3) flagging, based on the scanning, the application as having accessed the sensitive data that is protected by the data loss prevention policy, (4) detecting that the application is requesting to output a data object in a format that obscures underlying content, and (5) performing, by a data loss prevention program, a remedial action to prevent loss of the sensitive data based on both flagging the application and detecting that the application is requesting to output the data object in the format that obscures underlying content.

說明書

As explained above in connection with method 300 in FIG. 3, the systems and methods disclosed herein may overcome deficiencies of other data loss prevention systems that failed to prevent the leaking of sensitive data through one or more file formats, or data object formats, that the systems could not scan or parse. For example, image files may display text and yet traditional data loss prevention systems may have failed to parse the text within the images, because the text was not encoded in a computer readable format as a string. Moreover, in some examples, performing optical character recognition to parse the text may be overly burdensome and inefficient, especially if most images do not include text, much less sensitive data. To overcome these and other problems, the disclosed systems and methods may monitor whether applications access sensitive data and then flag those applications that do access sensitive data.

FIG. 6 is a block diagram of an exemplary computing system 610 capable of implementing one or more of the embodiments described and/or illustrated herein. For example, all or a portion of computing system 610 may perform and/or be a means for performing, either alone or in combination with other elements, one or more of the steps described herein (such as one or more of the steps illustrated in FIG. 3). All or a portion of computing system 610 may also perform and/or be a means for performing any other steps, methods, or processes described and/or illustrated herein.

權(quán)利要求

1
微信群二維碼
意見反饋