DECRYPTING FILES FOR DATA LEAKAGE PROTECTION IN AN ENTERPRISE NETWORK
First Claim
Patent Images
1. A method for providing data leak protection (DLP), comprising:
- determining that an application executing at a terminal is in the process of transmitting an encrypted file from the terminal; and
in response to determining that the encrypted file is being transmitted from the terminal, identifying a password entered by users for a file encryption procedure performed with the application that decrypts the encrypted file;
decrypting the encrypted file to generated a decrypted file;
determining that the decrypted file is a file subject to DLP; and
in response to determining that the decrypted file is a file subject to DLP, preventing the transmitting of the file from the terminal.
1 Assignment
0 Petitions
Accused Products
Abstract
Techniques are provided for decrypting an encrypted file within an enterprise network. The techniques include identifying by a password collecting module a password entered during a file encryption procedure performed at a terminal and storing the password; receiving an encrypted file by a data leakage protection (DLP) module; and attempting to decrypt the encrypted file with the password by the DLP module.
-
Citations
20 Claims
-
1. A method for providing data leak protection (DLP), comprising:
-
determining that an application executing at a terminal is in the process of transmitting an encrypted file from the terminal; and in response to determining that the encrypted file is being transmitted from the terminal, identifying a password entered by users for a file encryption procedure performed with the application that decrypts the encrypted file; decrypting the encrypted file to generated a decrypted file; determining that the decrypted file is a file subject to DLP; and in response to determining that the decrypted file is a file subject to DLP, preventing the transmitting of the file from the terminal. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. An apparatus for providing data leak protection (DLP), comprising:
-
a processor; a non-transitory, computer-readable medium coupled to the processor; and logic, stored on the computer-readable medium and executed on the processor, for; determining that an application executing at a terminal is in the process of transmitting an encrypted file from the terminal; and in response to determining that the encrypted file is being transmitted from the terminal, identifying a password entered by users for a file encryption procedure performed with the application that decrypts the encrypted file; decrypting the encrypted file to generated a decrypted file; determining that the decrypted file is a file subject to DLP; and in response to determining that the decrypted file is a file subject to DLP, preventing the transmitting of the file from the terminal. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A computer programming product for providing data leak protection (DLP), comprising:
-
a non-transitory, computer-readable medium; and logic, stored on the computer-readable medium for execution on a processor, for; determining that an application executing at a terminal is in the process of transmitting an encrypted file from the terminal; and
,in response to determining that the encrypted file is being transmitted from the terminal, identifying a password entered by users for a file encryption procedure performed with the application that decrypts the encrypted file; decrypting the encrypted file to generated a decrypted file; determining that the decrypted file is a file subject to DLP; and in response to determining that the decrypted file is a file subject to DLP, preventing the transmitting of the file from the terminal. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification