Browse Prior Art Database

Data leakage protection method Disclosure Number: IPCOM000032775D
Original Publication Date: 2004-Nov-12
Included in the Prior Art Database: 2004-Nov-12
Document File: 2 page(s) / 22K

Publishing Venue



Recently, there is a problem of stealing account data from customers of major banks and e-commerce sites by malicious codes embedded in web sites. There was also another problem of stealing bank account data using PCs in an internet cafe. On these PCs, software that collects keyboard input automatically and sends the data by e-mail was installed. This invention offers a new automatic blocking mechanism for leakage of personal information.

This text was extracted from a PDF file.
At least one non-text object (such as an image or picture) has been suppressed.
This is the abbreviated version, containing approximately 52% of the total text.

Page 1 of 2

Data leakage protection method

For many cases, users can not know about codes in a web site or software installed on their PCs by others. We, therefore, adopt a mechanism that software checks whether important information flows out of a PC and the software blocks the leakage of information. Though there may be another software that detects data transmission on the Internet in application layer and asks users' permission to send the data, such software is unsuitable for preventing leakage of information, because once you accept data transmission for an application subsequent transmission is allowed implicitly. Watching data transmission in both application and data level, the mechanism of this invention can block automatically leakage of personal information that users don't want anybody to know.

Fig. 1 shows a functional block diagram of this idea. Original parts of this idea, which are indicated by dotted line blocks, contain the following functions: 1) detecting an application that is trying to send data, 2) extracting the data, 3) detecting an outflow of data that users don't request and displaying it, and 4) blocking data transmission. The features of this invention are automatic detecting of an application, data accessing the Internet, entry matching with data registered in advance, and automatic blocking of unmatched data transmission. These features make it possible to protect important information.

Fig. 1




application detecting component

data analyzing and checking component

data detecting component


registered records/logs

a network driver

   Network (Internet/Intranet)

Fig. 2 shows a detailed sequence of this processing.

1) When an application is trying to send data on the network, the application detecting...