FILE SCANNING TOOL
First Claim
1. A method of determining the origin location of compromised information in a structured data file, comprising:
- receiving, in a scanning tool, at least one of format information or content information from the compromised information in the structured data file, using a processing device operatively coupled to a memory device and a communication device, and configured to execute computer-readable program code of the scanning tool;
scanning a plurality of networked devices for origin structured data files with at least one of format information or content information similar to the compromised information in the structured data file, using the processing device; and
outputting a potential origin location for the compromised information in the structured data file based on the location of the origin structured data files scanned, using the processing device.
1 Assignment
0 Petitions
Accused Products
Abstract
Embodiments of the invention relate to systems, methods, and computer program products for improved file identification. Embodiments herein disclosed provide for a file scanning tool that receives input related to compromised information in a structured data file and scans databases, servers, systems, or computers throughout a company for origin structured data files that contain the same or similar information as the compromised information in the structured data file. The file scanning tool then outputs the location of the origin structured data files that have the same or similar information. The file scanning tool can be used for various purposes, especially as a tool for investigators trying to determine if other information from the same location could have been compromised, the responsible parties, and the contact information of customers whose information was compromised, so the company can notify customers if their account information has changed.
195 Citations
37 Claims
-
1. A method of determining the origin location of compromised information in a structured data file, comprising:
-
receiving, in a scanning tool, at least one of format information or content information from the compromised information in the structured data file, using a processing device operatively coupled to a memory device and a communication device, and configured to execute computer-readable program code of the scanning tool; scanning a plurality of networked devices for origin structured data files with at least one of format information or content information similar to the compromised information in the structured data file, using the processing device; and outputting a potential origin location for the compromised information in the structured data file based on the location of the origin structured data files scanned, using the processing device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method of determining the origin location of compromised information in a structured data file, comprising:
-
receiving, in a scanning tool, at least one of format information or content information from the compromised information in the structured data file, using a processing device operatively coupled to a memory device and a communication device, and configured to execute computer-readable program code of the scanning tool; scanning a plurality of networked devices for origin structured data files with the format information or content information similar to the compromised information in the structured data file, using the processing device, wherein scanning comprises; identifying a header in a scanned origin structured data file; determining the content of the header in the scanned origin structured data file; identifying a sample value in a scanned origin structured data file; determining the format of the sample value in the scanned origin structured data file; determining the content of the sample value in the scanned origin structured data file; assigning the header most likely associated with the sample value in the scanned origin structured data file when the sample value does not have a header; comparing at least one of the header or the sample value from the compromised information in the structured data file with the corresponding header or the sample value from the origin structured data files; and outputting a potential origin location for the compromised information in the structured data file based on the location of the origin structured data files scanned, using the processing device. - View Dependent Claims (13, 14, 15)
-
-
16. A file scanning tool system for determining the origin location of compromised information in a structured data file, comprising:
-
a memory device; a communication device; a processing device, operatively coupled to the memory device and the communication device, and configured to execute computer-readable program code to; receive format information or content information from the compromised information in the structured data file; scan a plurality of networked devices for origin structured data files with at least one of format information or content information similar to the compromised information in the structured data file; and output a potential origin location for the compromised information in the structured data file based on the location of the origin structured data files scanned. - View Dependent Claims (17, 18, 19, 20, 21, 22, 23, 24, 25, 26)
-
-
27. A computer program product for a file scanning tool, for determining the origin location of compromised information in a structured data file, comprising at least one computer-readable medium having computer-readable program code portions embodied therein, the computer-readable program code portions comprising:
-
an executable portion configured for receiving format information or content information from the compromised information in the structured data file, using a processing device operatively coupled to a memory device and a communication device; an executable portion configured for scanning a plurality of networked devices for origin structured data files with at least one of format information or content information similar to the compromised information in the structured data file, using the processing device; and outputting a potential origin location for the compromised information in the structured data file based on the location of the origin structured data files scanned, using the processing device. - View Dependent Claims (28, 29, 30, 31, 32, 33, 34, 35, 36, 37)
-
Specification