Filtering data transfers
First Claim
1. A content filtering system comprising:
- one or more processors; and
memory communicatively coupled to the one or more processors and storing an operating system, the operating system including a security agent that, when executed by the one or more processors, cause the one or more processors to perform acts comprising;
detecting that data is being added to an electronic message;
comparing the data to predetermined data that is classified as sensitive data to determine that the data is sensitive;
determining at least one of a software application that was opened prior to adding the data to the electronic message, a software application that was closed prior to adding the data to the electronic message, or information that was accessed prior to adding the data to the electronic message;
based at least in part on determining that the data is sensitive and the determining at least one of the software application that was opened prior to adding the data to the electronic message, the software application that was closed prior to adding the data to the electronic message, or the information that was accessed prior to adding the data to the electronic message, determining that transmitting the data in the electronic message poses a security risk; and
based at least in part on the determining that transmitting the data in the electronic message poses the security risk, preventing the electronic message from being transmitted over a network.
2 Assignments
0 Petitions
Accused Products
Abstract
Techniques for selectively filtering data are discussed herein. For example, a request to include data in an electronic message or a request to copy the data to a portable storage device may be received. If the data is sensitive data, the techniques may determine a software application that was opened or closed prior to receiving the request, or information that was accessed prior to receiving the request. The techniques may determine if including the data in the electronic message or copying the data to the portable storage device poses a security risk. If a security risk is identified, a task may be performed, such as alerting a network administrator, providing a notification to a user regarding the data, or preventing copying or transmission of the data.
-
Citations
20 Claims
-
1. A content filtering system comprising:
-
one or more processors; and memory communicatively coupled to the one or more processors and storing an operating system, the operating system including a security agent that, when executed by the one or more processors, cause the one or more processors to perform acts comprising; detecting that data is being added to an electronic message; comparing the data to predetermined data that is classified as sensitive data to determine that the data is sensitive; determining at least one of a software application that was opened prior to adding the data to the electronic message, a software application that was closed prior to adding the data to the electronic message, or information that was accessed prior to adding the data to the electronic message; based at least in part on determining that the data is sensitive and the determining at least one of the software application that was opened prior to adding the data to the electronic message, the software application that was closed prior to adding the data to the electronic message, or the information that was accessed prior to adding the data to the electronic message, determining that transmitting the data in the electronic message poses a security risk; and based at least in part on the determining that transmitting the data in the electronic message poses the security risk, preventing the electronic message from being transmitted over a network. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system comprising:
-
one or more processors; and memory that stores instructions that, when executed by the one or more processors, cause the one or more processors to perform acts comprising; receiving a request to copy data to a portable storage device; comparing the data to predetermined data that is classified as sensitive data to determine that the data is sensitive; determining at least one of a software application that was opened prior to receiving the request to copy the data to the portable storage device, a software application that was closed prior to receiving the request to copy the data to the portable storage device, or information that was accessed prior to receiving the request to copy the data to the portable storage device; based at least in part on determining that the data is sensitive and the determining at least one of the software application that was opened prior to receiving the request to copy the data to the portable storage device, the software application that was closed prior to receiving the request to copy the data to the portable storage device, or the information that was accessed prior to receiving the request to copy the data to the portable storage device, determining that copying the data to the portable storage device poses a security risk; and based at least in part on the determining that copying the data to the portable storage device poses the security risk, performing an action. - View Dependent Claims (12, 13, 14, 15, 16, 17)
-
-
18. A method comprising:
-
detecting, by a computing device, at least one of a request to include data in an electronic message or a request to copy the data to a portable storage device; determining, by the computing device, that the data is sensitive data; determining, by the computing device, at least one of a software application that was opened prior to the detecting, a software application that was closed prior to the detecting, or information that was accessed prior to the detecting; based at least in part on the determining that the data is sensitive data and the determining at least one of the software application that was opened prior to the detecting, the software application that was closed prior to the detecting, or information that was accessed prior to the detecting, determining a security risk; and based at least in part on the determining the security risk, performing, by the computing device, an action. - View Dependent Claims (19, 20)
-
Specification