-
公开(公告)号:US20170093867A1
公开(公告)日:2017-03-30
申请号:US15277451
申请日:2016-09-27
Applicant: Box, Inc.
Inventor: Seena Burns , Nakul Chander , Adelbert Chang , Jonathan Shih-Shuo Fan , Divya Jain , Lev Kantorovskiy , Benjamin John Kus , Justin Peng
IPC: H04L29/06
CPC classification number: H04L63/108 , H04L63/101 , H04L63/102 , H04L63/107
Abstract: Systems and corresponding computer-implemented methods for context-based rule evaluation in an electronic data storage system are described. A request to perform an operation with respect to a resource is received from a client device, with the request including various attributes associated with the client device. At least one set of rules applicable to the operation is identified. The rules can be formed from a combination of primitives arranged to dynamically evaluate attributes associated with the resource and attributes associated with the client device. Based on the evaluation of the rule set(s), an action is identified to be performed with respect to the resource.
-
公开(公告)号:US10587584B2
公开(公告)日:2020-03-10
申请号:US14931770
申请日:2015-11-03
Applicant: Box, Inc.
Inventor: Victor De Vansa Vikramaratne , Justin Peng , Minh-Tue Vo Thanh , Josh Kline
Abstract: Systems for secure cloud-based collaboration over shared objects. Embodiments operate within systems in a cloud-based environment, wherein one or more servers are configured to interface with storage devices that store objects accessible by one or more users. A process receives an electronic message comprising a user request to access an object. Before providing user access to the object, the system generates a requestor-specific steganographic message that is derived from some portion of requestor identification information and/or other user attributes, and/or object storage parameters. Various forms of a requestor-specific steganographic message are applied to selected portions of the object to generate a requestor-specific protected object, which is then provided to the requestor. A web crawler can identify posted unauthorized protected object disclosures. Using quantitative calculations and/or heuristics together with requestor-specific aspects of the embedded steganographic message, the source of the unauthorized disclosure can be identified.
-
公开(公告)号:US10432644B2
公开(公告)日:2019-10-01
申请号:US15277451
申请日:2016-09-27
Applicant: Box, Inc.
Inventor: Seena Burns , Nakul Chander , Adelbert Chang , Jonathan Shih-Shuo Fan , Divya Jain , Lev Kantorovskiy , Benjamin John Kus , Justin Peng
IPC: H04L29/06
Abstract: Systems and corresponding computer-implemented methods for context-based rule evaluation in an electronic data storage system are described. A request to perform an operation with respect to a resource is received from a client device, with the request including various attributes associated with the client device. At least one set of rules applicable to the operation is identified. The rules can be formed from a combination of primitives arranged to dynamically evaluate attributes associated with the resource and attributes associated with the client device. Based on the evaluation of the rule set(s), an action is identified to be performed with respect to the resource.
-
公开(公告)号:US20170126631A1
公开(公告)日:2017-05-04
申请号:US14931770
申请日:2015-11-03
Applicant: Box, Inc.
Inventor: Victor De Vansa Vikramaratne , Justin Peng , Minh-Tue Vo Thanh , Josh Kline
Abstract: Systems for secure cloud-based collaboration over shared objects. Embodiments operate within systems in a cloud-based environment, wherein one or more servers are configured to interface with storage devices that store objects accessible by one or more users. A process receives an electronic message comprising a user request to access an object. Before providing user access to the object, the system generates a requestor-specific steganographic message that is derived from some portion of requestor identification information and/or other user attributes, and/or object storage parameters. Various forms of a requestor-specific steganographic message are applied to selected portions of the object to generate a requestor-specific protected object, which is then provided to the requestor. A web crawler can identify posted unauthorized protected object disclosures. Using quantitative calculations and/or heuristics together with requestor-specific aspects of the embedded steganographic message, the source of the unauthorized disclosure can be identified.
-
-
-