DATA LOSS PROTECTION THROUGH APPLICATION DATA ACCESS CLASSIFICATION
First Claim
Patent Images
1. A computer-implemented method comprising:
- monitoring file access events associated with an application;
determining whether at least one of the file access events indicates an attempt by an application to manipulate data of a file; and
if the at least one file access event indicates the attempt to manipulate the data of the file, causing at least one action to be performed.
3 Assignments
0 Petitions
Accused Products
Abstract
A method and apparatus for classifying behavior of an application based on its data access pattern is described. In one embodiment, the method includes monitoring file access events associated with an application, and determining whether at least one of the file access events indicates the application'"'"'s attempt to manipulate data of a file. If at least one file access event indicates the application'"'"'s attempt to manipulate the data within the file, then at least one action is caused to be performed.
-
Citations
20 Claims
-
1. A computer-implemented method comprising:
-
monitoring file access events associated with an application; determining whether at least one of the file access events indicates an attempt by an application to manipulate data of a file; and if the at least one file access event indicates the attempt to manipulate the data of the file, causing at least one action to be performed. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 10, 11)
-
-
12. A system comprising:
-
an application request analyzer to monitor file access events associated with an application, and to determine whether at least one of the file access events indicates an attempt by an application to manipulate data of a file; and an action manager, coupled to the application request analyzer, to perform at least one action if the at least one file access event indicates the attempt to manipulate the file data. - View Dependent Claims (13, 14, 15, 16, 17)
-
-
18. A computer readable storage medium that provides instructions, which when executed on a processing system cause the processing system to perform a method comprising:
-
monitoring file access events associated with an application; determining whether at least one of the file access events indicates an attempt by an application to manipulate data of a file; and if the at least one file access event indicates the attempt to manipulate the data of the file, causing at least one action to be performed. - View Dependent Claims (19, 20)
-
Specification