Decrypting files for data leakage protection in an enterprise network
First Claim
Patent Images
1. A method for providing data leak protection (DLP), comprising:
- monitoring an application executed at a terminal;
monitoring a procedure performed with a predetermined application executed at the terminal to determine that an encrypted file is in the process of being transmitted from the terminal; and
,in response to determining that the encrypted file is being transmitted from the terminal, identifying a password entered by users for a file encryption procedure performed with the predetermined application that decrypts the encrypted file;
decrypting the encrypted file to generated a decrypted file;
identifying meta data of the encrypted file, wherein the decrypting comprises selecting the password by determining that the meta data of the encrypted file matches at least a portion of meta data of the password;
determining that the decrypted file is a file subject to DLP; and
in response to determining that the decrypted file is a the subject to DLP, preventing the transmitting of the file from the terminal.
1 Assignment
0 Petitions
Accused Products
Abstract
Techniques are provided for decrypting an encrypted file within an enterprise network. The techniques include identifying by a password collecting module a password entered during a file encryption procedure performed at a terminal and storing the password; receiving an encrypted file by a data leakage protection (DLP) module; and attempting to decrypt the encrypted file with the password by the DLP module.
52 Citations
17 Claims
-
1. A method for providing data leak protection (DLP), comprising:
-
monitoring an application executed at a terminal; monitoring a procedure performed with a predetermined application executed at the terminal to determine that an encrypted file is in the process of being transmitted from the terminal; and
,in response to determining that the encrypted file is being transmitted from the terminal, identifying a password entered by users for a file encryption procedure performed with the predetermined application that decrypts the encrypted file; decrypting the encrypted file to generated a decrypted file; identifying meta data of the encrypted file, wherein the decrypting comprises selecting the password by determining that the meta data of the encrypted file matches at least a portion of meta data of the password; determining that the decrypted file is a file subject to DLP; and in response to determining that the decrypted file is a the subject to DLP, preventing the transmitting of the file from the terminal. - View Dependent Claims (2, 3, 4, 5, 6, 7, 12)
-
-
8. An apparatus for providing data leak protection (DLP), comprising:
-
a processor; a non-transitory, computer-readable medium coupled to the processor; and logic, stored on the computer-readable medium and executed on the processor, for; monitoring an application executed at a terminal; monitoring a procedure performed with a predetermined application executed at the terminal to determine that an encrypted file is in the process of being transmitted from the terminal; and in response to determining that the encrypted file is being transmitted from the terminal, identifying a password entered by users for a file encryption procedure performed with the predetermined application that decrypts the encrypted file; decrypting the encrypted file to generated a decrypted file; identifying meta data of the encrypted file, wherein the decrypting comprises selecting the password by determining that the meta data of the encrypted file matches at least a portion of meta data of the password; determining that the decrypted file is a file subject to DLP; and in response to determining that the decrypted file is a file subject to DLP, preventing the process of transmitting the file from the terminal. - View Dependent Claims (9, 10, 11)
-
-
13. A computer programming product for providing data leak protection (DLP), comprising:
-
a non-transitory, computer-readable medium; and logic, stored on the computer-readable medium for execution on a processor, for; monitoring an application executed at a terminal; monitoring a procedure performed with a predetermined application executed at the terminal to determine that an encrypted file is in the process of being transmitted from the terminal; and
,in response to determining that the encrypted file is being transmitted from the terminal, identifying at password entered by users for a file encryption procedure performed with the predetermined application that decrypts the encrypted file; decrypting the encrypted file to generated a decrypted file; identifying meta data of the encrypted file, wherein the decrypting comprises selecting the password by determining that the meta data of the encrypted file matches at least a portion of meta data of the password; determining that the decrypted file is a file subject to DLP; and in response to determining that the decrypted file is a file subject to DLP, preventing the process of transmitting the file from the terminal. - View Dependent Claims (14, 15, 16, 17)
-
Specification