DATA LEAKAGE PROTECTION IN CLOUD APPLICATIONS
First Claim
Patent Images
1. A computer-implemented method for data leakage protection, comprising:
- selecting, based upon communication between a user and a cloud application and from a plurality of monitoring templates, a monitoring template corresponding to the cloud application;
generating, using the selected monitoring template, a monitor;
obtaining, using the generated monitor, identifying information of content shared between the user and the cloud application; and
obtaining, according to the identifying information of the shared content, data about the shared content for security analysis.
1 Assignment
0 Petitions
Accused Products
Abstract
A computer-implemented method for data leakage protection is disclosed. A monitoring template corresponding to the cloud application is selected based upon communication between a user and a cloud application and from a plurality of monitoring templates. A monitor is generated using the selected monitoring template. Identifying information of content shared between the user and the cloud application is obtained using the generated monitor. Data about the shared content for security analysis is obtained according to the identifying information of the shared content.
-
Citations
20 Claims
-
1. A computer-implemented method for data leakage protection, comprising:
-
selecting, based upon communication between a user and a cloud application and from a plurality of monitoring templates, a monitoring template corresponding to the cloud application; generating, using the selected monitoring template, a monitor; obtaining, using the generated monitor, identifying information of content shared between the user and the cloud application; and obtaining, according to the identifying information of the shared content, data about the shared content for security analysis. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A computer-hardware system for data leakage protection, comprising:
a processor, wherein the processor is configured to initiate and/or perform; selecting, based upon communication between a user and a cloud application and from a plurality of monitoring templates, a monitoring template corresponding to the cloud application; generating, using the selected monitoring template, a monitor; obtaining, using the generated monitor, identifying information of content shared between the user and the cloud application; and obtaining, according to the identifying information of the shared content, data about the shared content for security analysis. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
19. A computer program product comprising a computer usable storage medium having stored therein computer usable program code for data leakage protection, the computer usable program code, which when executed by a computer hardware system, causes the computer hardware system to perform:
-
selecting, based upon communication between a user and a cloud application and from a plurality of monitoring templates, a monitoring template corresponding to the cloud application; generating, using the selected monitoring template, a monitor; obtaining, using the generated monitor, identifying information of content shared between the user and the cloud application; and obtaining, according to the identifying information of the shared content, data about the shared content for security analysis. - View Dependent Claims (20)
-
Specification