Determining whether continuous byte data of inputted data includes credential
First Claim
Patent Images
1. A system for detecting user credentials, comprising:
- an interface configured toreceive a plurality of data chunks;
a processor configured to;
determine a number of continuous bytes in the plurality of data chunks having appropriate values, comprising to;
determine whether a first byte and a second byte in the continuous bytes both correspond to an alphanumeric character, the first byte and the second byte both being next to each other in the continuous bytes; and
in response to a determination that the first byte and the second byte both correspond to the alphanumeric character, assign an appropriate value to both the first byte and the second byte;
in response to a determination that the number of the continuous bytes is greater than or equal to a threshold number of bytes, determine whether continuous byte data of the continuous bytes comprises a credential, comprising to;
perform one or more of the following;
A) determine whether the continuous byte data matches a credential pattern, the credential pattern including a length, a digit pattern, known digits, or any combination thereof; and
in response to a determination that the continuous byte data matches the credential pattern, indicate that the continuous byte data includes the credential;
orB) determine whether the continuous byte data meets a credential entropy test, the credential entropy test including determining whether the continuous byte data has a higher entropy that regular text; and
in response to a determination that the continuous byte data meets the credential entropy test, indicate that the continuous byte data includes the credential; and
in response to a determination that the continuous byte data of the continuous bytes comprises the credential, perform one or more of the following;
A) delete the credential from the plurality of data chunks;
orB) replace the credential with a code; and
store the credential in portion of a repository associated with the code.
4 Assignments
0 Petitions
Accused Products
Abstract
A system for detecting user credentials comprising an interface and a processor. The interface is configured to receive a plurality of data chunks. The processor is configured to determine a number of continuous bytes in the plurality of data chunks having appropriate values and, in the event that the number of the continuous bytes is greater than or equal to a threshold number of bytes, determine whether continuous byte data of the continuous bytes comprises a credential.
-
Citations
15 Claims
-
1. A system for detecting user credentials, comprising:
-
an interface configured to receive a plurality of data chunks; a processor configured to; determine a number of continuous bytes in the plurality of data chunks having appropriate values, comprising to; determine whether a first byte and a second byte in the continuous bytes both correspond to an alphanumeric character, the first byte and the second byte both being next to each other in the continuous bytes; and in response to a determination that the first byte and the second byte both correspond to the alphanumeric character, assign an appropriate value to both the first byte and the second byte; in response to a determination that the number of the continuous bytes is greater than or equal to a threshold number of bytes, determine whether continuous byte data of the continuous bytes comprises a credential, comprising to; perform one or more of the following; A) determine whether the continuous byte data matches a credential pattern, the credential pattern including a length, a digit pattern, known digits, or any combination thereof; and in response to a determination that the continuous byte data matches the credential pattern, indicate that the continuous byte data includes the credential;
orB) determine whether the continuous byte data meets a credential entropy test, the credential entropy test including determining whether the continuous byte data has a higher entropy that regular text; and in response to a determination that the continuous byte data meets the credential entropy test, indicate that the continuous byte data includes the credential; and in response to a determination that the continuous byte data of the continuous bytes comprises the credential, perform one or more of the following; A) delete the credential from the plurality of data chunks;
orB) replace the credential with a code; and store the credential in portion of a repository associated with the code. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A method for detecting user credentials, comprising:
-
receiving a plurality of data chunks; determining, using a processor, a number of continuous bytes in the plurality of data chunks having appropriate values, comprising; determining whether a first byte and a second byte in the continuous bytes both correspond to an alphanumeric character, the first byte and the second byte both being next to each other in the continuous bytes; and in response to a determination that the first byte and the second byte both correspond to the alphanumeric character, assigning an appropriate value to both the first byte and the second byte; in response to a determination that the number of the continuous bytes is greater than or equal to a threshold number of bytes, determining whether continuous byte data of the continuous bytes comprises a credential, comprising; performing one or more of the following; A) determining whether the continuous byte data matches a credential pattern, the credential pattern including a length, a digit pattern, known digits, or any combination thereof; and in response to a determination that the continuous byte data matches the credential pattern, indicating that the continuous byte data includes the credential;
orB) determining whether the continuous byte data meets a credential entropy test, the credential entropy test including determining whether the continuous byte data has a higher entropy that regular text; and in response to a determination that the continuous byte data meets the credential entropy test, indicating that the continuous byte data includes the credential; and in response to a determination that the continuous byte data of the continuous bytes comprises the credential, performing one or more of the following; A) deleting the credential from the plurality of data chunks;
orB) replacing the credential with a code; and storing the credential in portion of a repository associated with the code.
-
-
15. A computer program product for detecting user credentials, the computer program product being embodied in a non-transitory computer readable storage medium and comprising computer instructions for:
-
receiving a plurality of data chunks; determining, using a processor, a number of continuous bytes in the plurality of data chunks having appropriate values, comprising; determining whether a first byte and a second byte in the continuous bytes both correspond to an alphanumeric character, the first byte and the second byte both being next to each other in the continuous bytes; and in response to a determination that the first byte and the second byte both correspond to the alphanumeric character, assigning an appropriate value to both the first byte and the second byte; in response to a determination that the number of the continuous bytes is greater than or equal to a threshold number of bytes, determining whether continuous byte data of the continuous bytes comprises a credential, comprising; performing one or more of the following; A) determining whether the continuous byte data matches a credential pattern, the credential pattern including a length, a digit pattern, known digits, or any combination thereof; and in response to a determination that the continuous byte data matches the credential pattern, indicating that the continuous byte data includes the credential;
orB) determining whether the continuous byte data meets a credential entropy test, the credential entropy test including determining whether the continuous byte data has a higher entropy that regular text; and in response to a determination that the continuous byte data meets the credential entropy test, indicating that the continuous byte data includes the credential; and in response to a determination that the continuous byte data of the continuous bytes comprises the credential, performing one or more of the following; A) deleting the credential from the plurality of data chunks;
orB) replacing the credential with a code; and storing the credential in portion of a repository associated with the code.
-
Specification