Data leakage protection in cloud applications
First Claim
Patent Images
1. A computer-implemented method within a data leakage protection hardware system positioned separate from and between a client and a cloud application, comprising:
- receiving, from the client, a communication between the client and the cloud application;
selecting, from a plurality of monitoring templates and based upon the communication, a monitoring template corresponding to the cloud application;
receiving, from the cloud application, a response to the communication;
generating, using the selected monitoring template, a monitor;
revising the received response to include the monitor; and
forwarding the revised response to the client.
1 Assignment
0 Petitions
Accused Products
Abstract
A computer-implemented method for data leakage protection is disclosed. A monitoring template corresponding to the cloud application is selected based upon communication between a user and a cloud application and from a plurality of monitoring templates. A monitor is generated using the selected monitoring template. Identifying information of content shared between the user and the cloud application is obtained using the generated monitor. Data about the shared content for security analysis is obtained according to the identifying information of the shared content.
10 Citations
20 Claims
-
1. A computer-implemented method within a data leakage protection hardware system positioned separate from and between a client and a cloud application, comprising:
-
receiving, from the client, a communication between the client and the cloud application; selecting, from a plurality of monitoring templates and based upon the communication, a monitoring template corresponding to the cloud application; receiving, from the cloud application, a response to the communication; generating, using the selected monitoring template, a monitor; revising the received response to include the monitor; and forwarding the revised response to the client. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A data leakage protection hardware system positioned separate from and between a client and a cloud application, comprising:
a computer hardware processor configured to initiate the following operations; receiving, from the client, a communication between the client and the cloud application; selecting, from a plurality of monitoring templates and based upon the communication, a monitoring template corresponding to the cloud application; receiving, from the cloud application, a response to the communication; generating, using the selected monitoring template, a monitor; revising the received response to include the monitor; and forwarding the revised response to the client. - View Dependent Claims (10, 11, 12, 13, 14)
-
15. A computer program product, comprising
a computer usable hardware storage device having computer usable program code stored therein, the computer usable program code, which when executed by a data leakage protection hardware system positioned separate from and between a client and a cloud application, causes the data leakage protection hardware system to perform: -
receiving, from the client, a communication between the client and the cloud application; selecting, from a plurality of monitoring templates and based upon the communication, a monitoring template corresponding to the cloud application; receiving, from the cloud application, a response to the communication; generating, using the selected monitoring template, a monitor; revising the received response to include the monitor; and forwarding the revised response to the client. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification