Unlock instant, AI-driven research and patent intelligence for your innovation.

A system, method and computer readable medium for protecting sensitive data

A sensitive data and quantitative technology, applied in digital transmission systems, computer security devices, computing, etc., can solve the problems of not effectively providing data leakage event analysis, not considering the risk of data leakage, etc.

Active Publication Date: 2021-11-02
BEIJING VOYAGER TECH CO LTD
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For example, such techniques do not consider the risk of data breaches prior to a data breach event, fail to facilitate preventive actions prior to a data breach event, or do not effectively provide analysis of a data breach event

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A system, method and computer readable medium for protecting sensitive data
  • A system, method and computer readable medium for protecting sensitive data
  • A system, method and computer readable medium for protecting sensitive data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] Specific non-limiting embodiments of the invention will now be described with reference to the accompanying drawings. It should be understood that specific features and aspects of any embodiment disclosed herein can be used and / or combined with specific features and aspects of any other embodiment disclosed herein. It should also be understood that these embodiments are exemplary, and merely describe a small number of embodiments within the scope of the invention. Various changes and modifications involved in the present invention, which are obvious to those skilled in the art, are deemed to be within the spirit, scope and intent of the present invention as further defined in the appended claims.

[0022] The methods disclosed herein improve data leakage protection techniques for protecting encrypted files. By using file encryption information for a file set, a violation of an access control policy for the file set can be determined. Using file encryption information ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Get the encryption information for the files of the fileset. The file encryption information defines: (1) the number of encrypted files in the file set, (2) the number of encryption classes associated with the encrypted files, (3) unauthorized access rights that do not match the user The number of encrypted files, and (4) the number of unauthorized encryption classes associated with the unauthorized encrypted files. A violation of an access control policy is determined based on the file encryption information.

Description

[0001] related application [0002] This application claims the benefit of priority to U.S. Nonprovisional Application No. 16 / 035,764, entitled "Multi-Pronged File Anomaly Detection Based on Violation Counts," filed July 16, 2018, The content of said US non-provisional application is hereby incorporated by reference in its entirety. technical field [0003] The present disclosure generally relates to protecting sensitive data using multi-file anomaly detection. Background technique [0004] An encryption class, such as an encryption class indicating the sensitivity of information contained in a file or the cryptographic nature of a file, may be used in a computing system to protect the contents of a file. For example, data leakage protection techniques may use encryption classes associated with files to provide real-time prevention of data leakage (unauthorized access to files). That is, data loss protection techniques may attempt to protect encrypted files when unauthori...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/62G06F21/60G06F21/31H04L9/14H04L9/18H04L15/06
CPCG06F21/604G06F21/6245G06F16/122H04L63/105H04L63/1433H04L63/205G06F21/6218G06F2221/2141G06F16/285H04L63/102H04L63/20
Inventor 任力伟
Owner BEIJING VOYAGER TECH CO LTD