×

Deriving encryption rules based on file content

  • US 9,405,928 B2
  • Filed: 09/17/2014
  • Issued: 08/02/2016
  • Est. Priority Date: 09/17/2014
  • Status: Active Grant
First Claim
Patent Images

1. A data storage system comprising:

  • a content analyzer comprising computer hardware, the content analyzer configured to;

    access a set of training files that include content designated as sensitive information; and

    use one or more processing algorithms with respect to the set of training files to obtain a set of data tokens for each training file, each of the data tokens from the set of data tokens comprising a portion of a training file from the set of training files, the portion of the training file comprising content included in the training file, at least some of the training files including at least some of the sensitive information;

    an encryption rules generator comprising computer hardware, the encryption rules generator configured to;

    use one or more algorithms to generate a set of encryption rules based on the set of data tokens obtained for each training file, wherein at least some of the set of encryption rules are configured to identify a file to encrypt based at least in part on a correspondence between portions of the file and at least some of the set of data tokens;

    generate a prospective encryption rule based on an aggregated set of data tokens, the aggregated set of data tokens based on the set of data tokens for each training file;

    perform the prospective encryption rule using the set of training files;

    determine a number of training files from the set of training files identified for encryption based on the prospective encryption rule; and

    responsive, at least in part, to the number of training files identified for encryption satisfying a threshold, adding the prospective encryption rule to the set of encryption rules; and

    an encryption processor comprising computer hardware, the encryption processor configured to encrypt the file based at least in part on one of the encryption rules from the set of encryption rules.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×