SYSTEM AND METHOD FOR PROTECTING SPECIFIED DATA COMBINATIONS
9 Assignments
0 Petitions
Accused Products
Abstract
A method in one example implementation includes extracting a plurality of data elements from a record of a data file, tokenizing the data elements into tokens, and storing the tokens in a first tuple of a registration list. The method further includes selecting one of the tokens as a token key for the first tuple, where the token is selected because it occurs less frequently in the registration list than each of the other tokens in the first tuple. In specific embodiments, at least one data element is an expression element having a character pattern matching a predefined expression pattern that represents at least two words and a separator between the words. In other embodiments, at least one data element is a word defined by a character pattern of one or more consecutive essential characters. Other specific embodiments include determining an end of the record by recognizing a predefined delimiter.
57 Citations
70 Claims
-
1-50. -50. (canceled)
-
51. A system for protecting data in a network, the system comprising:
-
a registration subsystem configured to; create a plurality of tuples, wherein a first tuple includes data file tokens corresponding to respective data elements in a data file; and select one of the data file tokens as a token key to index the first tuple; and create an index table with a particular index including the token key; and a detection subsystem configured to; tokenize data elements in an object into corresponding object tokens; identify the first tuple based on determining the token key of the particular index in the index table corresponds to a particular object token of the object tokens; and validate an event if an amount of correspondence between the data file tokens in the first tuple and the object tokens meets a predetermined threshold. - View Dependent Claims (52, 53, 54, 55, 56, 57, 58)
-
-
59. At least one non-transitory machine readable medium for protecting data in a network, the at least one non-transitory machine readable medium having instructions stored thereon that, when executed, cause one or more processors to:
-
create a plurality of tuples, wherein a first tuple includes data file tokens corresponding to respective data elements in a data file; and select one of the data file tokens as a token key to index the first tuple; create an index table with a particular index including the token key; tokenize data elements in an object into corresponding object tokens; identify the first tuple based on determining the token key of the particular index in the index table corresponds to a particular object token of the object tokens; and validate an event if an amount of correspondence between the data file tokens in the first tuple and the object tokens meets a predetermined threshold. - View Dependent Claims (60, 61, 62, 63, 64, 65, 66, 67)
-
-
68. A method for protecting data in a network, the method comprising:
-
creating, by at least one processor of a registration system, a plurality of tuples, wherein a first tuple includes data file tokens corresponding to respective data elements in a data file; and selecting one of the data file tokens as a token key to index the first tuple; and creating an index table with a particular index including the token key; and tokenizing, by at least one processor of a detection system, data elements in an object into corresponding object tokens; identifying the first tuple based on determining the token key of the particular index in the index table corresponds to a particular object token of the object tokens; and validating an event if an amount of correspondence between the data file tokens in the first tuple and the object tokens meets a predetermined threshold. - View Dependent Claims (69, 70)
-
Specification