The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Aug. 08, 2017

Filed:

Jun. 29, 2016
Applicant:

Commvault Systems, Inc., Tinton Falls, NJ (US);

Inventors:

Arun Prasad Amarendran, Manalapan, NJ (US);

Tirthankar Chatterjee, Tinton Falls, NJ (US);

Yun Yuan, Eatontown, NJ (US);

Yongtao Liu, Eatontown, NJ (US);

Assignee:

Commvault Systems, Inc., Tinton Falls, NJ (US);

Attorney:
Primary Examiner:
Int. Cl.
CPC ...
G06F 21/62 (2013.01); G06F 12/14 (2006.01); H04L 29/06 (2006.01); H04L 29/08 (2006.01); G06F 21/60 (2013.01); G06N 5/02 (2006.01); G06F 17/27 (2006.01); G06F 17/30 (2006.01); G06N 99/00 (2010.01);
U.S. Cl.
CPC ...
G06F 12/1408 (2013.01); G06F 17/27 (2013.01); G06F 17/3012 (2013.01); G06F 21/602 (2013.01); G06F 21/6218 (2013.01); G06N 5/02 (2013.01); G06N 99/005 (2013.01); H04L 63/0428 (2013.01); H04L 67/10 (2013.01); G06F 2212/1052 (2013.01); G06F 2212/402 (2013.01); G06F 2221/2107 (2013.01);
Abstract

Data storage systems are disclosed for automatically generating encryption rules based on a set of training files that are known to include sensitive information. The system may use a number of heuristic algorithms to generate one or more encryption rules for determining whether a file includes sensitive information. Further, the system may apply the heuristic algorithms to the content of the files, as determined by using natural language processing algorithms, to generate the encryption rules. Moreover, systems are disclosed that are capable of automatically determining whether to encrypt a file based on the generated encryption rules. The content of the file may be determined using natural language processing algorithms and then the encryption rules may be applied to the content of the file to determine whether to encrypt the file.


Find Patent Forward Citations

Loading…