Determining whether continuous byte data of inputted data includes credential
First Claim
Patent Images
1. A system for detecting user credentials, comprising:
- one or more processors; and
one or more computer-readable media having stored thereon computer-executable instructions that are executable by the one or more processors to efficiently protect a user credential in an input data stream, the computer-executable instructions including instructions that are executable by the one or more processors to perform at least;
determine a plurality of data chunks in the input data stream; and
for one or more of the plurality of data chunks;
determine whether each byte of data in the data chunk comprises a valid byte value for the user credential;
represent each byte of data in the data chunk with a corresponding bit that indicates whether or not the byte of data comprises a valid byte value for the user credential;
using the representations of each byte of data in the data chunk, determine whether there is a continuous number of bits greater than or equal to a threshold number, that each indicates that its corresponding byte of data in the data chunk comprises a valid byte value for the user credential;
based on determining that there is a continuous number of bits greater than or equal to the threshold, determine a credential address range for a corresponding continuous number of bytes;
determine whether data stored at the credential address range comprises the user credential; and
when the data stored at the credential address range comprises the user credential prevent the user credential from being stored in public storage.
4 Assignments
0 Petitions
Accused Products
Abstract
A system for detecting user credentials comprising an interface and a processor. The interface is configured to receive a plurality of data chunks. The processor is configured to determine a number of continuous bytes in the plurality of data chunks having appropriate values and, in the event that the number of the continuous bytes is greater than or equal to a threshold number of bytes, determine whether continuous byte data of the continuous bytes comprises a credential.
-
Citations
15 Claims
-
1. A system for detecting user credentials, comprising:
-
one or more processors; and one or more computer-readable media having stored thereon computer-executable instructions that are executable by the one or more processors to efficiently protect a user credential in an input data stream, the computer-executable instructions including instructions that are executable by the one or more processors to perform at least; determine a plurality of data chunks in the input data stream; and for one or more of the plurality of data chunks; determine whether each byte of data in the data chunk comprises a valid byte value for the user credential; represent each byte of data in the data chunk with a corresponding bit that indicates whether or not the byte of data comprises a valid byte value for the user credential; using the representations of each byte of data in the data chunk, determine whether there is a continuous number of bits greater than or equal to a threshold number, that each indicates that its corresponding byte of data in the data chunk comprises a valid byte value for the user credential; based on determining that there is a continuous number of bits greater than or equal to the threshold, determine a credential address range for a corresponding continuous number of bytes; determine whether data stored at the credential address range comprises the user credential; and when the data stored at the credential address range comprises the user credential prevent the user credential from being stored in public storage. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A method implemented at a computer system that includes one or more processors, for efficiently protecting a user credential in an input data stream, comprising:
-
determining a plurality of data chunks in the input data stream; and for one or more of the plurality of data chunks; determining whether each byte of data in the data chunk comprises a valid byte value for the user credential; representing each byte of data in the data chunk with a corresponding bit that indicates whether or not the byte of data comprises a valid byte value for the user credential; using the representation of each byte of data in the data chunk, determining whether there is a continuous number of bits, greater than or equal to a threshold number, that each indicates that its corresponding byte of data in the data chunk comprises a valid byte value for the user credential; based on determining that there is a continuous number of bits greater than or equal to the threshold number determining a credential address range for a corresponding continuous number of bytes; determining whether data stored at the credential address range comprises the user credential; and when the data stored at the credential address range comprises the user credential, prevent the user credential from being stored in public storage.
-
-
15. A computer program product comprising one or more hardware storage devices having stored thereon computer-executable instructions that are executable by one or more processors of a computer system to efficiently protect a user credential in an input data stream, for the computer-executable instructions including instruction that are executable to cause the computer system to perform at least the following:
-
determining a plurality of data chunks in the in the input data stream; and for one or more of the plurality of data chunks; determining whether each byte of data in the data chunk comprises a valid byte value for the user credential; representing each byte of data in the data chunk with a corresponding bit that indicates whether or not the byte of data comprises a valid byte value for the user credential; using the representation of each byte of data in the data chunk, determining whether there is a continuous number of bits, greater than or equal to a threshold number, that each indicates that its corresponding byte of data in the data chunk comprises a valid byte value for the user credential; based on determining that there is a continuous number of bits greater than or equal to the threshold number determining a credential address range for a corresponding continuous number of bytes; determining whether data stored at the credential address range comprises the user credential; and when the data stored at the credential address range comprises the user credential, prevent the user credential from being stored in public storage.
-
Specification