Using bit arrays in incremental scanning of content for sensitive data
First Claim
Patent Images
1. A method comprising:
- identifying, by a processing device, a plurality of documents to be scanned for sensitive information according to at least one data loss prevention (DLP) policy, the plurality of documents being associated with a bit array;
generating a key of a document of the plurality of documents;
for the document, applying a set of functions to the key of the document, wherein outputs of the functions in the set of functions map the key to positions in the bit array; and
identifying a subset of the positions in the bit array that correspond to the outputs of the functions in the set of functions, the subset of the positions to indicate whether the document has been scanned.
2 Assignments
0 Petitions
Accused Products
Abstract
A method for incremental scanning of documents may include identifying documents to be scanned for sensitive information according to at least one data loss prevention (DLP) policy, the documents being associated with a bit array. The method may further include generating a key of a documents and applying, for each document, a set of functions to the key of the document, where outputs of the functions map the key to positions in the bit array. The method further includes identifying a subset of the positions in the bit array that correspond to the outputs of the functions in the set of functions, the subset of the positions to indicate whether the document has been scanned.
36 Citations
20 Claims
-
1. A method comprising:
-
identifying, by a processing device, a plurality of documents to be scanned for sensitive information according to at least one data loss prevention (DLP) policy, the plurality of documents being associated with a bit array; generating a key of a document of the plurality of documents; for the document, applying a set of functions to the key of the document, wherein outputs of the functions in the set of functions map the key to positions in the bit array; and identifying a subset of the positions in the bit array that correspond to the outputs of the functions in the set of functions, the subset of the positions to indicate whether the document has been scanned. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A non-transitory computer readable storage medium that provides instructions, which when executed by a processing device cause the processing device to perform operations comprising:
-
identifying, by a computer system, a plurality of documents to be scanned for sensitive information according to at least one data loss prevention (DLP) policy, the plurality of documents being associated with a bit array; generating a key of a document of the plurality of documents; for the document, applying a set of functions to the key of the document, wherein outputs of the functions in the set of functions map the key to positions in the bit array; and identifying a subset of the positions in the bit array that correspond to the outputs of the functions in the set of functions, the subset of the positions to indicate whether the document has been scanned. - View Dependent Claims (12, 13, 14, 15)
-
-
16. A system comprising:
-
a memory; and a processing device coupled to the memory, the processing device to; identify a plurality of documents to be scanned for sensitive information according to at least one data loss prevention (DLP) policy, the plurality of documents being associated with a bit array; generate a key of a document of the plurality of documents; for the document, apply a set of functions to the key of the document, wherein outputs of the functions in the set of functions map the key to positions in the bit array; and identify a subset of the positions in the bit array that correspond to the outputs of the functions in the set of functions, the subset of the positions to indicate whether the document has been scanned. - View Dependent Claims (17, 18, 19, 20)
-
Specification