Decrypting Files for Data Leakage Protection in an Enterprise Network
First Claim
Patent Images
1. A method, comprising;
- monitoring an application executed at a terminal;
monitoring a procedure performed with a predetermined application executed at the terminal; and
identifying a password entered by users for a file encryption procedure performed with the predetermined application.
1 Assignment
0 Petitions
Accused Products
Abstract
Techniques are provided for decrypting an encrypted file within an enterprise network. The techniques include identifying by a password collecting module a password entered during a the encryption procedure performed at a terminal and storing the password: receiving an encrypted file by a data leakage protection (DLP) module; and attempting to decrypt the encrypted file with the password by the DLP module.
54 Citations
8 Claims
-
1. A method, comprising;
-
monitoring an application executed at a terminal; monitoring a procedure performed with a predetermined application executed at the terminal; and identifying a password entered by users for a file encryption procedure performed with the predetermined application. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
Specification