Data Leakage Prevention for Cloud and Enterprise Networks
First Claim
1. An apparatus comprising:
- a data storage device; and
a processor communicatively coupled to the data storage device, the processor in cooperation with the data storage device configured to;
determine a signature of a transmitted document, the transmitted document being in transit to a location beyond a network boundary;
compare the signature of the document with one or more signatures of documents authorized to be transmitted beyond the network boundary; and
prevent the transmitted document from being transmitted beyond the network boundary if the signature of the transmitted document does not correspond to a signature of a document authorized to be transmitted beyond the network boundary.
11 Assignments
0 Petitions
Accused Products
Abstract
Apparatuses, methods and articles of manufacture for performing data leakage prevention are provided. Data leakage prevention may be performed by determining a signature of a transmitted document, the transmitted document being in transit to a location beyond a network boundary. The signature of the transmitted document is compared with one or more signatures of documents authorized to be transmitted beyond the network boundary. The transmitted document is prevented from being transmitted beyond the network boundary if the signature of the document does not correspond to a signature of a document authorized to be transmitted beyond the network boundary.
23 Citations
22 Claims
-
1. An apparatus comprising:
-
a data storage device; and a processor communicatively coupled to the data storage device, the processor in cooperation with the data storage device configured to; determine a signature of a transmitted document, the transmitted document being in transit to a location beyond a network boundary; compare the signature of the document with one or more signatures of documents authorized to be transmitted beyond the network boundary; and prevent the transmitted document from being transmitted beyond the network boundary if the signature of the transmitted document does not correspond to a signature of a document authorized to be transmitted beyond the network boundary. - View Dependent Claims (2, 3, 4, 5)
-
-
6. An apparatus comprising:
-
a data storage device; and a processor communicatively coupled to the data storage device, the processor configured to; generate a random number having a fixed number of bytes; determine a byte value corresponding to a byte in a document authorized to be transmitted beyond a network boundary; determine a position value corresponding to a position of the byte in the document; and execute a logical function between the byte value, the position value and a byte of the random number corresponding to the position value to generate a signature for the document. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A non-transitory computer-readable medium having computer program instructions stored thereon, which, when executed on a processor, cause the processor to perform a method comprising:
-
determining a signature of a transmitted document, the transmitted document being in transit to a location beyond a network boundary; comparing the signature of the transmitted document with one or more signatures of documents authorized to be transmitted beyond the network boundary; and preventing the transmitted document from being transmitted beyond the network boundary if the signature of the transmitted document does not correspond to a signature of a document authorized to be transmitted beyond the network boundary. - View Dependent Claims (12, 13, 14, 15)
-
-
16. A non-transitory computer-readable medium having computer program instructions stored thereon, which, when executed on a processor, cause the processor to perform a method comprising:
-
generating a random number having a fixed number of bytes; determining a byte value corresponding to a byte in a document authorized to be transmitted beyond a network boundary; determining a position value corresponding to a position of the byte in the document; and executing a logical function between the byte value, the position value and a byte of the random number corresponding to the position value to generate a signature for the document. - View Dependent Claims (17, 18, 19, 20)
-
-
21. A method comprising:
-
at a processor communicatively coupled to a data storage device, determining a signature of a transmitted document, the transmitted document being in transit to a location beyond a network boundary; comparing, by the processor in cooperation with the data storage device, the signature of the transmitted document with one or more signatures of documents authorized to be transmitted beyond the network boundary; and preventing, by the processor in cooperation with the data storage device, the transmitted document from being transmitted beyond the network boundary if the signature of the transmitted document does not correspond to a signature of a document authorized to be transmitted beyond the network boundary.
-
-
22. A method comprising:
-
at a processor communicatively coupled to a data storage device, generating a random number having a fixed number of bytes; determining, by the processor in cooperation with the data storage device, a byte value corresponding to a byte in a document authorized to be transmitted beyond a network boundary; determining, by the processor in cooperation with the data storage device, a position value corresponding to a position of the byte in the document; and executing, by the processor in cooperation with the data storage device, a logical function between the byte value, the position value and a byte of the random number corresponding to the position value to generate a signature for the document.
-
Specification