摘要:
A system for analyzing the contents of encrypted data without having access to the private cryptographic information necessary for decryption. The system interacts with a Security Provider (SP) having access to the private cryptographic information in such a manner that the system can gain access to a decrypted copy of encrypted data. In this manner, the SP system can delegate to an authorized instantiation of the system the necessary trust to access decrypted data without delegating the necessary trust to access private cryptographic information. All interaction between the SP and the system occurs through an Isolation API which ensures that only authorized instantiations of the system will obtain decrypted data and that the private cryptographic information accessible to the SP will not be revealed. When the system receives an indication of electronic data that is to be distributed or accessed, the system first determines if the data is encrypted. If so, the system interacts with an SP to obtain a decrypted copy of the data, and may provide to the SP an identifier that verifies the identity of the system. The system analyzes the contents of the decrypted copy to determine if the contents are appropriate ( e.g ., whether they contain compromised data). When necessary, the system modifies the decrypted data to remove compromised data or prevents access to or distribution of inappropriate data. In addition, the system can modify the data by adding information ( e.g ., a legal disclaimer or an indication of system approval).
摘要:
A method for monitoring electronic mail messages, each mail message comprising header information and a main body, particularly for protection against virus attacks and unsolicited commercial email (UCE). The method comprises generating a summary digest of only the subject line and the message content of the main body, wherein the message content may comprise textual content and/or attached files. The generated summary digest is stored in a memory, and compared with existing summary digests stored in memory. If the number of matches exceeds a threshold value, an alert signal is raised and appropriate action initiated. A timestamp may be stored with each summary digest, together with sender/recipient details and the internet protocol (IP) address of origin, to aid detection of the originator of the message.
摘要:
A method of applying a policy comprises receiving a text and applying the policy to the text. If the policy is violated, the method further comprises redacting the text; reapplying the policy to the redacted text. In response to a result of reapplying the policy to the redacted text action is taken as determined by the policy.
摘要:
A method of applying a policy to a text comprises searching the text for data having a predefined form; and searching a dataset for additional data associated with any data having the predefined form found in the text. A supplementary search query is generated using said additional data; and the text is searched using the supplementary search query. The policy is then applied based on a result of the search using the supplementary search query.
摘要:
A method is disclosed, for recognizing whether some electronic data is the digital representation of a piece of text and, if so, in which character encoding it has been encoded. A fingerprint is constructed from the data, wherein the fingerprint comprises, for each of a plurality of predetermined character encoding schemes, at least one confidence value, representing a confidence that the data was encoded using said character encoding scheme. The fingerprint also comprises a frequency value for each of a subset of byte values, each frequency value representing the frequency of occurrence of a respective byte value in the data. A statistical classification of the data is then performed based on the fingerprint. The method may be applied to spam classification.
摘要:
A method for retrieving a resource such as a data file includes determining an email address of a user requesting the retrieval, and checking whether a characteristic condition associated with said resource is satisfied. If the characteristic condition is not satisfied, for example if the size of the resource exceeds a threshold, a message is returned to the user indicating that said request for retrieval of said resource has been received, and the request is placed in a queue. The queue is processed on the basis of a rule, and the resource retrieved when said queue has been sufficiently processed, when the user can be notified by means of the email address that the resource has been retrieved. Also disclosed is a similar process for uploading data files in response to a request.