[go: up one dir, main page]

WO2020245475A1 - Method and computer programs for monitoring content uploaded/shared to computer applications or platforms - Google Patents

Method and computer programs for monitoring content uploaded/shared to computer applications or platforms Download PDF

Info

Publication number
WO2020245475A1
WO2020245475A1 PCT/ES2019/070384 ES2019070384W WO2020245475A1 WO 2020245475 A1 WO2020245475 A1 WO 2020245475A1 ES 2019070384 W ES2019070384 W ES 2019070384W WO 2020245475 A1 WO2020245475 A1 WO 2020245475A1
Authority
WO
WIPO (PCT)
Prior art keywords
file
computing device
user
computer
shared
Prior art date
Application number
PCT/ES2019/070384
Other languages
Spanish (es)
French (fr)
Inventor
Aruna Prem BIANZINO
Rames SARWAT SHAKER
Antonio BORDÓN VILLAR
Roberto ANTA RODRÍGUEZ
Original Assignee
Telefonica Cybersecurity Tech S.L.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Telefonica Cybersecurity Tech S.L. filed Critical Telefonica Cybersecurity Tech S.L.
Priority to PCT/ES2019/070384 priority Critical patent/WO2020245475A1/en
Publication of WO2020245475A1 publication Critical patent/WO2020245475A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/17Details of further file system functions
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/93Document management systems
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V10/00Arrangements for image or video recognition or understanding
    • G06V10/10Image acquisition

Definitions

  • the present invention relates generally to methods for the authenticity and integrity of documents.
  • the invention concerns a method and computer programs for monitoring content uploaded / shared in applications or computer platforms that allow information to be shared with other users and / or to send information to another location.
  • KR 20040008550-A describes a solution for securely sharing and monitoring documents between authorized users.
  • the solution includes an infrastructure through which secret keys are distributed to users, as well as different modules, where users must log in and where files are stored.
  • this solution requires active user intervention, it only protects the desired files, actively configured by the user / system manager, and not any generic file shared by a generic user.
  • this solution requires the end user to remember credentials, requires complex infrastructure and infrastructure management. Similar considerations apply to patent applications CN 103561034-A and CN 101989984-A.
  • US 20130318589-A1 describes a solution to control the exchange of secret content within and across the boundaries of a company, depending on the needs of the user.
  • This solution includes an infrastructure, including an exchange server where content is shared and stored.
  • the solution requires user intervention to directly control what content they want to share and with whom, regulating only the specific content that has been previously registered in the specific solution.
  • US 20020171859-A1 describes a solution to protect confidential documents to be printed, through the use of a password system. This solution only works for visual files (that is, such as office or images, but not for generic data files, audios, databases, etc.). This solution only avoids file sharing through printing, not through social networks or messaging systems. Finally, this solution asks the end user to memorize multiple passwords in order to share the desired file and it is not transparent for them in their work functionalities.
  • Examples of embodiments of the present invention provide according to a first aspect, a method for monitoring content uploaded / shared in applications or computer platforms, such as instant messaging applications (for example Skype®, WhatsApp®, Google Hangouts® , Facebook Messenger®, etc.), social networks (for example, Facebook® or Instagram®), data / file sharing or hosting platforms (for example, Microsoft Teams®, Slack®, WeTransfer®, Google Drive®, Dropbox ®, Firefox Send®, etc.).
  • instant messaging applications for example Skype®, WhatsApp®, Google Hangouts® , Facebook Messenger®, etc.
  • social networks for example, Facebook® or Instagram®
  • data / file sharing or hosting platforms for example, Microsoft Teams®, Slack®, WeTransfer®, Google Drive®, Dropbox ®, Firefox Send®, etc.
  • the proposed method comprises a) performing, by a computing device that includes one or more processors and at least one memory, a screenshot (it can capture more than one) of the interface of a computer application or a computer platform when a first user uploads or shares a file (with at least one second user) on or through said application or computing platform; b) extract, by the device computing, a text of said image captured by applying an optical character recognition algorithm, providing a text file; and c) obtaining, through the computing device, different information from said text file to reduce blind spots in monitoring the upload / sharing of said file.
  • the present invention proposes a new solution to capture the image of the interface of an application or computer platform to identify a file shared / uploaded through said application / platform, and optionally also identify the eventual users with whom it is shared. the aforementioned file.
  • said information obtained in step c) may include one or more of: file name, file type, file size, name or identifier of the first user, name or identifier of the second user (or group of users), instant of time in which the upload / sharing is performed and / or communication channel used, preview of the file, if applicable. That is, the computing device analyzes the text of the captured image in search of known positions (depending on the type of application / platform that is being used to upload / share the file) based on the file name, type, size, name of the user with whom it is shared, etc.
  • the screen capture is carried out automatically, for example at the instant of time in which the computing device detects an action of attaching, dragging or dropping said file on the interface.
  • said step a) may further comprise capturing a characteristic image (avatar) of one of the two users (or both).
  • the characteristic image can be captured from each of the members of the group of users with whom the file is shared.
  • the screenshot made is stored in a memory of the computing device.
  • the storage is temporary.
  • the information obtained in step c) is stored in a memory of the computing device.
  • the method may further comprise comparing said file name with a previously stored file of the same name (and / or size and type, and / or file preview), in order to verify whether it is a possible file. marked as sensitive to eventually generate an alarm. Furthermore, by recognizing the file, this activity can be added to its life cycle.
  • the method may further comprise identifying actions on the uploaded / shared file and / or detecting possible inappropriate or unauthorized uses thereof.
  • a computer program product is an embodiment having a computer-readable medium that includes computer program instructions encoded therein, which when executed on at least one processor of a computer system execute the operations outlined herein. document as embodiments of the invention.
  • said computer program product will be installed on the computing device of the user who shares the data with other users or who uploads the file, that is to say the first user as referred to above or user issuing the file.
  • the present invention provides a transparent methodology for the end user, without affecting their functionality and need to share files and information, and without asking them to remember additional passwords and credentials, or to register the files a priori in a monitoring system. , allowing monitoring of any type of file, whether it is viewable or not, regardless of whether the file was shared intentionally or accidentally, and not requesting a complex infrastructure that supports the solution and that needs to be configured, and not requesting that the monitored files are stored on an external medium (for example, a server).
  • an external medium for example, a server
  • the present invention also represents an improvement in the detection of information leaks about files that belong to an organization and that are shared with other users, accidentally or intentionally, through channels that, by their nature, do not report these events. or they do not allow the obtaining of this data by other means (usually social networks and instant messaging systems, such as Skype®, Facebook®, etc.).
  • Fig. 1 illustrates a diagram of a method for monitoring uploaded / shared content in computer applications or platforms according to the present invention.
  • Fig. 2 schematically illustrates the concept of operation of the extraction method proposed for the extraction of information present in the screenshot according to an embodiment of the present invention.
  • Fig. 3A shows an example of the information captured in text from the interface of an application or computing platform.
  • Fig. 3B shows an example of the text information, extracted raw.
  • Fig. 1 shows an example of an embodiment of a method for monitoring uploaded / shared content in computer applications or platforms.
  • the method in this case comprises making, by a computing device, such as a PC, a computing server, etc., of a first user (step 101), a screenshot of the interface of said application / computing platform such such as an instant messaging application (for example Skype®), a social network (for example Facebook®) or a platform for hosting data in the cloud (for example Dropbox®), among others, when said first user uploads or shares a file on or via application / platform.
  • the method comprises extracting a text from the captured image by applying an optical character recognition algorithm, for example an OCR algorithm, providing a text file (see Fig. 3A for an example).
  • an optical character recognition algorithm for example an OCR algorithm
  • the method comprises obtaining different information (see Fig. 3B for an example) from the text file to reduce blind spots in the monitoring of the upload / share of the file. In this way, it is possible to obtain real information about the upload (or upload) or file sharing actions carried out in said applications / computer platforms.
  • the file can be shared with more than one user, that is, with several users with whom communication is maintained through the aforementioned applications / platforms or even with a group.
  • the previous method in the aforementioned Step 101 may comprise capturing several screenshots, at different instants in time, or a sequence of screenshots.
  • the information obtained can include: file name, file type, file size, name or identifier of the first user, name or identifier of the second user (or group of users), instant of time in which the upload / share is performed , preview of the uploaded / shared file and / or communication channel used.
  • Fig. 2 schematically shows the previous step 102, that is, the methodology for extracting the information present in the screenshot.
  • This capture process is transparent to the first user and may or may not be configured to provide the first user with any information on the subject that should indicate the performance of said action.
  • the present invention also makes it possible to capture additional useful information such as, for example, an image / avatar of the first user, the second user (or group of users), or even both. It could even capture additional useful information such as the first page of the uploaded / shared file, if this is a text or visual document, for example a Word or a PDF.
  • the capture process will be limited to the exclusive search for the above information and will discriminate against any other information that is not helpful, that is not related to the described purpose or that is illegible.
  • the captured image in an exemplary embodiment, will be temporarily stored in the computing device until it is sent to a centralized character recognition service, where the image will be processed to extract the detected characters and proceed to their subsequent normalization. Preferably, once the image is sent, it will be completely erased from the computing device. In other embodiments, the captured image can be stored permanently or for a long period of time (for example months or years).
  • the information obtained for the "File name” can be compared with an existing list of file names, where the names of all the files are stored, together with the operations that have been executed on them and any metadata. (timestamp, executing user, etc.). In addition, other characteristics of the file, such as size and type, can also be compared.
  • the invention will proceed to store this information (and eventually the rest of the collected metadata), associating it (if possible) with a parent file (source file), expanding the traceability information of the uploaded / shared file and activating or not other security mechanisms designed to protect the information (including eventual notification, blocking and compliance systems, etc., for example, in the case of uploading / sharing files marked as sensitive).
  • the proposed invention can be implemented in hardware, software, firmware or any combination thereof. If implemented in software, the functions can be stored in or encoded as one or more instructions or code on a computer-readable medium.
  • Computer-readable medium includes computer storage medium.
  • the storage medium can be any available medium that can be accessed by a computer.
  • such computer-readable medium may comprise RAM, ROM, EEPROM, CD-ROM, or other optical disk storage, solid-state or magnetic disk storage, or other magnetic storage devices, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer.
  • Disk (disk) and disk (disc), as used herein, include compact discs (CD), laser disc, optical disc, digital versatile disc (DVD), floppy disc, and Blu-ray disc where the discs ( disks) normally reproduce data magnetically, whereas discs (dises) reproduce data optically with lasers. Combinations of the above should also be included within the scope of computer-readable medium.
  • Any processor and storage medium can reside in an ASIC.
  • the ASIC can reside in a user terminal.
  • the processor and storage medium can reside as discrete components in a user terminal.
  • computer program products comprising computer-readable media include all forms of computer-readable medium except, to the extent that such medium is considered to be non-established transient propagation signals.
  • the scope of the present invention is defined in the appended claims.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • Multimedia (AREA)
  • Strategic Management (AREA)
  • Human Resources & Organizations (AREA)
  • Entrepreneurship & Innovation (AREA)
  • General Business, Economics & Management (AREA)
  • Operations Research (AREA)
  • Tourism & Hospitality (AREA)
  • Quality & Reliability (AREA)
  • Marketing (AREA)
  • Economics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention relates to a method and computer programs for monitoring content uploaded/shared to computer applications or platforms. The method includes (a) a computing device taking at least one screenshot of the interface of a computer application or platform when a first user uploads or shares a file with at least one second user, on or via said computer application or platform; (b) the computing device extracting text from said captured image by applying an optical character recognition algorithm, and providing a text file; and (c) the computing device obtaining various types of information from said text file so as to reduce blind spots when monitoring the upload/sharing of the file.

Description

Método v programas de ordenador para la monitorización de contenido subido/compartido en aplicaciones o plataformas informáticas Method and computer programs for the monitoring of content uploaded / shared in applications or computer platforms
Campo de la técnica Technical field
La presente invención concierne en general a métodos para la autenticidad e integridad de documentos. En particular, la invención concierne a un método y a programas de ordenador para la monitorización de contenido subido/compartido en aplicaciones o plataformas informáticas que permitan compartir información con otros usuarios y/o enviar información a otra ubicación. The present invention relates generally to methods for the authenticity and integrity of documents. In particular, the invention concerns a method and computer programs for monitoring content uploaded / shared in applications or computer platforms that allow information to be shared with other users and / or to send information to another location.
Antecedentes de la invención Background of the invention
En la actualidad, existen muchas soluciones que se centran en la seguridad de la compartición de archivos (es decir, el archivo se cifra antes de compartirlo, se transmite a través de un canal seguro y se descifra después de la recepción, protegiéndolo contra audiencia no deseada). Entre las soluciones conocidas se incluyen soluciones comerciales como FinalCode, que protege un archivo al compartirlo, pero no puede protegerlo contra la compartición de archivos no deseada (p. ej. , errores del usuario). Además, las soluciones disponibles en general no son transparentes para el usuario final, lo que les obliga a configurar el fichero/archivo como protegido, establecer permisos, etc. - generalmente centrándose en el archivo y no en el usuario - trabajando sólo con tipos de archivo limitados, por ejemplo, PDF, o en archivos visuales/imprimibles en general, como la solución Locklizard PDF Security, que sólo funciona con archivos PDF. Today, there are many solutions that focus on the security of file sharing (that is, the file is encrypted before it is shared, transmitted through a secure channel, and decrypted after receipt, protecting it against unintended audiences. desired). Known solutions include commercial solutions such as FinalCode, which protects a file when shared, but cannot protect it against unwanted file sharing (eg, user error). Furthermore, the solutions available in general are not transparent to the end user, which forces them to configure the file / archive as protected, set permissions, etc. - generally focusing on the file and not the user - working only with limited file types, for example PDF, or on general visual / printable files, like the Locklizard PDF Security solution, which only works with PDF files.
Asimismo se conocen algunas patentes y/o solicitudes de patente en el sector. Likewise, some patents and / or patent applications are known in the sector.
KR 20040008550- A describe una solución para compartir y monitorizar documentos de forma segura entre usuarios autorizados. La solución incluye una infraestructura a través de la cual se distribuyen claves secretas a los usuarios, así como diferentes módulos, donde los usuarios deben iniciar sesión y donde se almacenan los archivos. En general, esta solución requiere una intervención activa por parte del usuario, sólo protege los archivos deseados, configurados activamente por el usuario/gestor del sistema, y no cualquier archivo genérico compartido por un usuario genérico. Asimismo, esta solución requiere que el usuario final recuerde las credenciales, requiere una infraestructura compleja y una gestión de la infraestructura. Consideraciones similares son válidas para las solicitudes de patente CN 103561034- A y CN 101989984-A. US 20130318589-A1 describe una solución para controlar el intercambio de contenido secreto dentro y a través de los límites de una empresa, dependiendo de las necesidades del usuario. Esta solución incluye una infraestructura, incluyendo un servidor de intercambio donde el contenido es compartido y almacenado. Además, la solución requiere la intervención del usuario para controlar directamente qué contenidos quiere compartir y con quién, regulando sólo los contenidos específicos que han sido previamente registrados en la solución específica. KR 20040008550-A describes a solution for securely sharing and monitoring documents between authorized users. The solution includes an infrastructure through which secret keys are distributed to users, as well as different modules, where users must log in and where files are stored. In general, this solution requires active user intervention, it only protects the desired files, actively configured by the user / system manager, and not any generic file shared by a generic user. In addition, this solution requires the end user to remember credentials, requires complex infrastructure and infrastructure management. Similar considerations apply to patent applications CN 103561034-A and CN 101989984-A. US 20130318589-A1 describes a solution to control the exchange of secret content within and across the boundaries of a company, depending on the needs of the user. This solution includes an infrastructure, including an exchange server where content is shared and stored. Furthermore, the solution requires user intervention to directly control what content they want to share and with whom, regulating only the specific content that has been previously registered in the specific solution.
US 20020171859-A1 describe una solución para proteger documentos confidenciales que se van a imprimir, mediante el uso de un sistema de contraseñas. Esta solución sólo funciona para archivos visuales (es decir, como de oficina o imágenes, pero no para archivos de datos genéricos, audios, bases de datos, etc.). Esta solución sólo evita compartir archivos a través de la impresión, no a través de redes sociales o sistemas de mensajería. Finalmente, esta solución solicita al usuario final que memorice múltiples contraseñas para poder compartir el archivo deseado y no es transparente para ellos en sus funcionalidades de trabajo. US 20020171859-A1 describes a solution to protect confidential documents to be printed, through the use of a password system. This solution only works for visual files (that is, such as office or images, but not for generic data files, audios, databases, etc.). This solution only avoids file sharing through printing, not through social networks or messaging systems. Finally, this solution asks the end user to memorize multiple passwords in order to share the desired file and it is not transparent for them in their work functionalities.
Por lo tanto, se necesitan nuevas soluciones para asegurar la monitorización de contenido subido/compartido en aplicaciones o plataformas informáticas, por ejemplo aplicaciones de mensajería instantánea, aplicaciones de compartición de información/archivos entre usuarios, plataformas de alojamiento de datos en la nube, redes sociales, etc. Therefore, new solutions are needed to ensure the monitoring of content uploaded / shared in applications or computing platforms, for example instant messaging applications, information / file sharing applications between users, cloud data hosting platforms, networks social, etc.
Exposición de la invención Presentation of the invention
Ejemplos de realización de la presente invención, aportan de acuerdo a un primer aspecto, un método para la monitorización de contenido subido/compartido en aplicaciones o plataformas informáticas, tales como aplicaciones de mensajería instantánea (por ejemplo Skype®, WhatsApp®, Google Hangouts®, Facebook Messenger®, etc.), redes sociales (por ejemplo, Facebook® o Instagram®), plataformas de compartición o alojamiento de datos/archivos (por ejemplo, Microsoft Teams®, Slack®, WeTransfer®, Google Drive®, Dropbox®, Firefox Send®, etc.). Examples of embodiments of the present invention, provide according to a first aspect, a method for monitoring content uploaded / shared in applications or computer platforms, such as instant messaging applications (for example Skype®, WhatsApp®, Google Hangouts® , Facebook Messenger®, etc.), social networks (for example, Facebook® or Instagram®), data / file sharing or hosting platforms (for example, Microsoft Teams®, Slack®, WeTransfer®, Google Drive®, Dropbox ®, Firefox Send®, etc.).
El método propuesto comprende a) realizar, por un dispositivo de computación que incluye uno o más procesadores y al menos una memoria, una captura de pantalla (puede capturar más de una) de la interfaz de una aplicación informática o de una plataforma informática cuando un primer usuario sube o comparte un archivo (con al menos un segundo usuario) en o mediante dicha aplicación o plataforma informática; b) extraer, por el dispositivo de computación, un texto de dicha imagen capturada mediante la aplicación de un algoritmo de reconocimiento óptico de caracteres, proporcionando un fichero de texto; y c) obtener, por el dispositivo de computación, diferente información de dicho fichero de texto para reducir puntos ciegos en la monitorización de la subida/compartición del citado fichero. The proposed method comprises a) performing, by a computing device that includes one or more processors and at least one memory, a screenshot (it can capture more than one) of the interface of a computer application or a computer platform when a first user uploads or shares a file (with at least one second user) on or through said application or computing platform; b) extract, by the device computing, a text of said image captured by applying an optical character recognition algorithm, providing a text file; and c) obtaining, through the computing device, different information from said text file to reduce blind spots in monitoring the upload / sharing of said file.
Es decir, la presente invención propone una nueva solución para capturar la imagen de la interface de una aplicación o plataforma informática para identificar un archivo compartido/subido a través de dicha aplicación/plataforma, y opcionalmente también identificar los eventuales usuarios con los que se comparte el citado archivo. That is, the present invention proposes a new solution to capture the image of the interface of an application or computer platform to identify a file shared / uploaded through said application / platform, and optionally also identify the eventual users with whom it is shared. the aforementioned file.
Según la presente invención, la citada información obtenida en la etapa c) puede incluir una o más de: nombre del archivo, tipo de archivo, tamaño del archivo, nombre o identificador del primer usuario, nombre o identificador del segundo usuario (o grupo de usuarios), instante de tiempo en el que se realiza la carga/com partición y/o canal de comunicación utilizado, vista previa del archivo, si aplicable. Es decir, el dispositivo de computación analiza el texto de la imagen capturada en búsqueda de posiciones conocidas (dependiendo del tipo de aplicación/plataforma que se esté utilizando para subir/compartir el archivo) en base en el nombre del archivo, tipo, tamaño, nombre del usuario con que se comparte, etc. According to the present invention, said information obtained in step c) may include one or more of: file name, file type, file size, name or identifier of the first user, name or identifier of the second user (or group of users), instant of time in which the upload / sharing is performed and / or communication channel used, preview of the file, if applicable. That is, the computing device analyzes the text of the captured image in search of known positions (depending on the type of application / platform that is being used to upload / share the file) based on the file name, type, size, name of the user with whom it is shared, etc.
Particularmente, la captura de pantalla se realiza de manera automática, por ejemplo en el instante de tiempo en el que el dispositivo de computación detecta una acción de adjuntar, arrastrar o soltar dicho archivo en la interfaz. In particular, the screen capture is carried out automatically, for example at the instant of time in which the computing device detects an action of attaching, dragging or dropping said file on the interface.
En el caso que el archivo se comparta con un segundo usuario, la citada etapa a) puede comprender además capturar una imagen característica (avatar) de uno de los dos usuarios (o de los dos). En el caso que el archivo se comparta con más de un usuario, la imagen característica puede capturarse de cada uno de los integrantes del grupo de usuarios con que se comparte el archivo. In the case that the file is shared with a second user, said step a) may further comprise capturing a characteristic image (avatar) of one of the two users (or both). In the case that the file is shared with more than one user, the characteristic image can be captured from each of the members of the group of users with whom the file is shared.
En un ejemplo de realización, previamente a la realización de la etapa b), la captura de pantalla realizada se almacena en una memoria del dispositivo de computación. Preferiblemente, el almacenamiento es temporal. In an exemplary embodiment, prior to performing step b), the screenshot made is stored in a memory of the computing device. Preferably, the storage is temporary.
En un ejemplo de realización, la información obtenida en la etapa c) se almacena en una memoria del dispositivo de computación. Asimismo, el método puede comprender además comparar dicho nombre del archivo con un archivo previamente almacenado y del mismo nombre (y/o tamaño y tipo, y/o vista previa del archivo), con el objetivo de verificar si se trata de un eventual fichero marcado como sensible para eventualmente generar una alarma. Además, al reconocer el fichero se puede añadir esta actividad a su ciclo de vida. Alternativamente o complementariamente, el método puede comprender además identificar acciones sobre el archivo subido/compartido y/o detectar posibles usos inadecuados o no autorizados del mismo. In an exemplary embodiment, the information obtained in step c) is stored in a memory of the computing device. Likewise, the method may further comprise comparing said file name with a previously stored file of the same name (and / or size and type, and / or file preview), in order to verify whether it is a possible file. marked as sensitive to eventually generate an alarm. Furthermore, by recognizing the file, this activity can be added to its life cycle. Alternatively or complementary, the method may further comprise identifying actions on the uploaded / shared file and / or detecting possible inappropriate or unauthorized uses thereof.
Otras realizaciones de la invención que se desvelan en el presente documento incluyen también productos de programas de ordenador para realizar las etapas y operaciones del método propuesto en el primer aspecto de la invención. Más particularmente, un producto de programa de ordenador es una realización que tiene un medio legible por ordenador que incluye instrucciones de programa informático codificadas en el mismo, que cuando se ejecutan en al menos un procesador de un sistema informático ejecutan las operaciones indicadas en el presente documento como realizaciones de la invención. Other embodiments of the invention disclosed herein also include computer program products for performing the steps and operations of the method proposed in the first aspect of the invention. More particularly, a computer program product is an embodiment having a computer-readable medium that includes computer program instructions encoded therein, which when executed on at least one processor of a computer system execute the operations outlined herein. document as embodiments of the invention.
Particularmente, el citado producto de programa de ordenador estará instalado en el dispositivo de computación del usuario que comparta los datos con otros usuarios o que suba el archivo, es decir el primer usuario tal como se ha referenciado anteriormente o usuario emisor del archivo. In particular, said computer program product will be installed on the computing device of the user who shares the data with other users or who uploads the file, that is to say the first user as referred to above or user issuing the file.
Por tanto, la presente invención proporciona una metodología transparente para el usuario final, sin afectar a su funcionalidad y necesidad de compartir archivos e información, y sin pedirle que recuerde contraseñas y credenciales adicionales, ni que registre a priori los archivos en un sistema de monitorización, permitiendo monitorizar cualquier tipo de archivo, sea visualizable o no, independientemente de que el compartir el fichero haya sido de manera intencionada o accidental, y no solicitando una infraestructura compleja que apoye la solución y que necesite configurarse, y no solicitando que los archivos monitorizados se almacenen en un soporte externo (por ejemplo, un servidor). Therefore, the present invention provides a transparent methodology for the end user, without affecting their functionality and need to share files and information, and without asking them to remember additional passwords and credentials, or to register the files a priori in a monitoring system. , allowing monitoring of any type of file, whether it is viewable or not, regardless of whether the file was shared intentionally or accidentally, and not requesting a complex infrastructure that supports the solution and that needs to be configured, and not requesting that the monitored files are stored on an external medium (for example, a server).
La presente invención también supone una mejora en la detección de fugas de información sobre archivos que pertenecen a una organización y que son compartidos con otros usuarios, de forma accidental o intencionada, a través de canales que, por su naturaleza, no informan de estos eventos o no permiten la obtención de estos datos por otros medios (normalmente redes sociales y sistemas de mensajería instantánea, como Skype®, Facebook®, etc.). The present invention also represents an improvement in the detection of information leaks about files that belong to an organization and that are shared with other users, accidentally or intentionally, through channels that, by their nature, do not report these events. or they do not allow the obtaining of this data by other means (usually social networks and instant messaging systems, such as Skype®, Facebook®, etc.).
Breve descripción de los dibujos Las anteriores y otras características y ventajas se comprenderán más plenamente a partir de la siguiente descripción detallada de unos ejemplos de realización, meramente ilustrativa y no limitativa, con referencia a los dibujos que la acompañan, en los que: Brief description of the drawings The foregoing and other characteristics and advantages will be more fully understood from the following detailed description of some exemplary embodiments, merely illustrative and not limiting, with reference to the accompanying drawings, in which:
La Fig. 1 ilustra un diagrama de un método para la monitorización de contenido subido/compartido en aplicaciones o plataformas informáticas según la presente invención. Fig. 1 illustrates a diagram of a method for monitoring uploaded / shared content in computer applications or platforms according to the present invention.
La Fig. 2 ilustra esquemáticamente el concepto de funcionamiento del método de extracción propuesto para la extracción de información presente en la captura de pantalla según un ejemplo de realización de la presente invención. Fig. 2 schematically illustrates the concept of operation of the extraction method proposed for the extraction of information present in the screenshot according to an embodiment of the present invention.
La Fig. 3A muestra un ejemplo de la información capturada en texto de la interfaz de una aplicación o plataforma informática. La Fig. 3B muestra un ejemplo de la información del texto, extraído en bruto. Fig. 3A shows an example of the information captured in text from the interface of an application or computing platform. Fig. 3B shows an example of the text information, extracted raw.
Descripción detallada de la invención y de unos ejemplos de realización Detailed description of the invention and some embodiments
Con referencia a la Fig. 1 , en la misma se muestra un ejemplo de realización de un método para la monitorización de contenido subido/compartido en aplicaciones o plataformas informáticas. El método en este caso comprende realizar, por un dispositivo de computación, tal como un PC, un servidor de computación, etc., de un primer usuario (etapa 101), una captura de pantalla de la interfaz de dicha aplicación/plataforma informática tal como una aplicación de mensajería instantánea (por ejemplo Skype®), una red social (por ejemplo Facebook®) o una plataforma de alojamiento de datos en la nube (por ejemplo Dropbox®), entre otras, cuando dicho primer usuario sube o comparte un archivo en o mediante la aplicación/plataforma. En la etapa 102, el método comprende extraer un texto de la imagen capturada mediante la aplicación de un algoritmo de reconocimiento óptico de caracteres, por ejemplo un algoritmo OCR, proporcionando un fichero de texto (ver Fig. 3A para un ejemplo). Finalmente, en la etapa 103, el método comprende obtener diferente información (ver Fig. 3B para un ejemplo) del fichero de texto para reducir puntos ciegos en la monitorización de la subida/compartición del fichero. De este modo, se permite obtener información real sobre las acciones de subida (o carga) o compartición de archivos realizadas en dichas aplicaciones/plataformas informáticas. With reference to Fig. 1, it shows an example of an embodiment of a method for monitoring uploaded / shared content in computer applications or platforms. The method in this case comprises making, by a computing device, such as a PC, a computing server, etc., of a first user (step 101), a screenshot of the interface of said application / computing platform such such as an instant messaging application (for example Skype®), a social network (for example Facebook®) or a platform for hosting data in the cloud (for example Dropbox®), among others, when said first user uploads or shares a file on or via application / platform. In step 102, the method comprises extracting a text from the captured image by applying an optical character recognition algorithm, for example an OCR algorithm, providing a text file (see Fig. 3A for an example). Finally, in step 103, the method comprises obtaining different information (see Fig. 3B for an example) from the text file to reduce blind spots in the monitoring of the upload / share of the file. In this way, it is possible to obtain real information about the upload (or upload) or file sharing actions carried out in said applications / computer platforms.
En el caso de compartirse, el archivo puede compartirse con más de un usuario, es decir con varios usuarios con el que se mantiene una comunicación a través de las citadas aplicaciones/plataformas o incluso con un grupo. Asimismo, el método anterior en la citada etapa 101 puede comprender capturar varias capturadas de pantalla, en diferentes instantes de tiempo, o una secuencia de capturas de pantalla. In the case of sharing, the file can be shared with more than one user, that is, with several users with whom communication is maintained through the aforementioned applications / platforms or even with a group. Likewise, the previous method in the aforementioned Step 101 may comprise capturing several screenshots, at different instants in time, or a sequence of screenshots.
La información obtenida puede incluir: nombre del archivo, tipo de archivo, tamaño del archivo, nombre o identificador del primer usuario, nombre o identificador del segundo usuario (o grupo de usuarios), instante de tiempo en el que se realiza la carga/compartición, vista previa del archivo subido/compartido y/o canal de comunicación utilizado. The information obtained can include: file name, file type, file size, name or identifier of the first user, name or identifier of the second user (or group of users), instant of time in which the upload / share is performed , preview of the uploaded / shared file and / or communication channel used.
La Fig. 2 muestra de manera esquemática la anterior etapa 102, es decir la metodología de extracción de la información presente en la captura de pantalla. Fig. 2 schematically shows the previous step 102, that is, the methodology for extracting the information present in the screenshot.
El método propuesto prevé realizar la citada captura de pantalla automáticamente en el instante de tiempo en el que el dispositivo de computación detecta una acción de adjuntar, arrastrar o soltar el archivo en la citada interfaz. Este proceso de captura es transparente para el primer usuario y puede estar configurado para proporcionar o no al primer usuario cualquier información sobre el asunto que debería indicar la realización de dicha acción. The proposed method foresees making said screen capture automatically at the instant of time in which the computing device detects an action of attaching, dragging or dropping the file on said interface. This capture process is transparent to the first user and may or may not be configured to provide the first user with any information on the subject that should indicate the performance of said action.
A nivel visual, la presente invención permite capturar también información adicional útil como, por ejemplo, una imagen/avatar del primer usuario, del segundo usuario (o grupo de usuarios), o incluso de ambos. Incluso, se podría capturar información adicional útil como por ejemplo la primera página del fichero subido/compartido, si este es un documento de texto o visual, por ejemplo un Word o un PDF. On a visual level, the present invention also makes it possible to capture additional useful information such as, for example, an image / avatar of the first user, the second user (or group of users), or even both. It could even capture additional useful information such as the first page of the uploaded / shared file, if this is a text or visual document, for example a Word or a PDF.
En cualquiera de los casos anteriores, el proceso de captura estará limitado a la búsqueda exclusiva de la anterior información y discriminará cualquier otra información que no sirva de ayuda, que no esté relacionada con el propósito descrito o que sea ilegible. In any of the above cases, the capture process will be limited to the exclusive search for the above information and will discriminate against any other information that is not helpful, that is not related to the described purpose or that is illegible.
La imagen capturada, en un ejemplo de realización, se almacenará temporalmente en el dispositivo de computación hasta que sea enviada a un servicio centralizado de reconocimiento de caracteres, donde se procesará la imagen para extraer los caracteres detectados y proceder a su posterior normalización. Preferiblemente, una vez que la imagen es enviada, será borrada completamente del dispositivo de computación. En otros ejemplos de realización, la imagen capturada puede ser almacenada permanentemente o durante un largo periodo de tiempo (por ejemplo meses o años). The captured image, in an exemplary embodiment, will be temporarily stored in the computing device until it is sent to a centralized character recognition service, where the image will be processed to extract the detected characters and proceed to their subsequent normalization. Preferably, once the image is sent, it will be completely erased from the computing device. In other embodiments, the captured image can be stored permanently or for a long period of time (for example months or years).
Además, la información obtenida para el "Nombre del archivo" se podrá comparar con una lista existente de nombres de archivo, donde se almacenan los nombres de todos los archivos, junto con las operaciones que se han ejecutado en ellos y eventuales metadatos (indicación de fecha y hora ( timestamp ), usuario ejecutor, etc.). Asimismo, se pueden comparar también otras características del archivo, como el tamaño y tipo. Furthermore, the information obtained for the "File name" can be compared with an existing list of file names, where the names of all the files are stored, together with the operations that have been executed on them and any metadata. (timestamp, executing user, etc.). In addition, other characteristics of the file, such as size and type, can also be compared.
Una vez cotejado el nombre del archivo y del usuario/alias que realiza la acción (es decir del primer usuario), la invención procederá a almacenar esta información (y eventualmente el resto de los metadatos recogidos), asociándola (si es posible) a un archivo padre (archivo fuente), ampliando la información de trazabilidad del archivo subido/compartido y activando o no otros mecanismos de seguridad diseñados para la protección de la información (incluyendo eventuales sistemas de notificación, bloqueo y cumplimiento, etc., por ejemplo, en el caso de subida/compartición de archivos marcados como sensibles). Once the name of the file and the user / alias performing the action (that is, the first user) have been collated, the invention will proceed to store this information (and eventually the rest of the collected metadata), associating it (if possible) with a parent file (source file), expanding the traceability information of the uploaded / shared file and activating or not other security mechanisms designed to protect the information (including eventual notification, blocking and compliance systems, etc., for example, in the case of uploading / sharing files marked as sensitive).
La invención propuesta puede implementarse en hardware, software, firmware o cualquier combinación de los mismos. Si se implementa en software, las funciones pueden almacenarse en o codificarse como una o más instrucciones o código en un medio legible por ordenador. The proposed invention can be implemented in hardware, software, firmware or any combination thereof. If implemented in software, the functions can be stored in or encoded as one or more instructions or code on a computer-readable medium.
El medio legible por ordenador incluye medio de almacenamiento informático. El medio de almacenamiento puede ser cualquier medio disponible que pueda accederse mediante un ordenador. A modo de ejemplo, y no de limitación, tal medio legible por ordenador puede comprender RAM, ROM, EEPROM, CD-ROM u otro almacenamiento de disco óptico, almacenamiento de disco magnético o de estado sólido, u otros dispositivos de almacenamiento magnético, o cualquier otro medio que pueda usarse para llevar o almacenar código de programa deseado en la forma de instrucciones o estructuras de datos y que pueda accederse mediante un ordenador. Disco (disk) y disco (disc), como se usan en el presente documento, incluyen discos compactos (CD), láser disc, disco óptico, disco versátil digital (DVD), disco flexible y disco de Blu-ray donde los discos (disks) reproducen normalmente datos de forma magnética, mientras que los discos (dises) reproducen datos de forma óptica con láseres. Deberían incluirse también combinaciones de los anteriores dentro del alcance de medio legible por ordenador. Cualquier procesador y el medio de almacenamiento pueden residir en un ASIC. El ASIC puede residir en un terminal de usuario. Como alternativa, el procesador y el medio de almacenamiento pueden residir como componentes discretos en un terminal de usuario. Computer-readable medium includes computer storage medium. The storage medium can be any available medium that can be accessed by a computer. By way of example, and not limitation, such computer-readable medium may comprise RAM, ROM, EEPROM, CD-ROM, or other optical disk storage, solid-state or magnetic disk storage, or other magnetic storage devices, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer. Disk (disk) and disk (disc), as used herein, include compact discs (CD), laser disc, optical disc, digital versatile disc (DVD), floppy disc, and Blu-ray disc where the discs ( disks) normally reproduce data magnetically, whereas discs (dises) reproduce data optically with lasers. Combinations of the above should also be included within the scope of computer-readable medium. Any processor and storage medium can reside in an ASIC. The ASIC can reside in a user terminal. Alternatively, the processor and storage medium can reside as discrete components in a user terminal.
Como se usa en el presente documento, los productos de programa de ordenador que comprenden medios legibles por ordenador incluyen todas las formas de medio legible por ordenador excepto, hasta el punto que ese medio se considere que no son señales de propagación transitorias no establecidas. El alcance de la presente invención está definido en las reivindicaciones adjuntas. As used herein, computer program products comprising computer-readable media include all forms of computer-readable medium except, to the extent that such medium is considered to be non-established transient propagation signals. The scope of the present invention is defined in the appended claims.

Claims

REIVINDICACIONES
1. Método para la monitorización de contenido subido/compartido en aplicaciones o plataformas informáticas, el método comprende: a) realizar al menos una captura de pantalla, por un dispositivo de computación, de la interfaz de una aplicación informática o de una plataforma informática cuando un primer usuario sube o comparte un archivo, con al menos un segundo usuario, en o mediante dicha aplicación o plataforma informática; b) extraer, por el dispositivo de computación, un texto de dicha imagen capturada, que es al menos una, mediante la aplicación de un algoritmo de reconocimiento óptico de caracteres, proporcionando un fichero de texto; y c) obtener, por el dispositivo de computación, diferente información de dicho fichero de texto para reducir puntos ciegos en la monitorización de la subida/compartición del fichero. 1. Method for monitoring content uploaded / shared in applications or computer platforms, the method comprises: a) taking at least one screen capture, by a computing device, of the interface of a computer application or a computer platform when a first user uploads or shares a file, with at least one second user, in or through said application or computer platform; b) extracting, by the computing device, a text from said captured image, which is at least one, by applying an optical character recognition algorithm, providing a text file; and c) obtaining, through the computing device, different information from said text file to reduce blind spots in monitoring the upload / sharing of the file.
2. El método de la reivindicación 1 , en donde dicha información obtenida en la etapa c) incluye una o más de: nombre del archivo, tipo de archivo, nombre o identificador del primer usuario, nombre o identificador del segundo usuario, instante de tiempo en el que se realiza la carga/compartición, tamaño del archivo, vista previa del archivo y/o canal de comunicación utilizado. The method of claim 1, wherein said information obtained in step c) includes one or more of: file name, file type, name or identifier of the first user, name or identifier of the second user, instant of time in which the upload / share is performed, file size, file preview and / or communication channel used.
3. El método de las reivindicaciones anteriores, en donde dicha captura se realiza automáticamente en el instante de tiempo en el que el dispositivo de computación detecta una acción de adjuntar, arrastrar o soltar dicho archivo en dicha interfaz. 3. The method of the preceding claims, wherein said capture is performed automatically at the instant of time in which the computing device detects an action of attaching, dragging or dropping said file on said interface.
4. El método de las reivindicaciones anteriores, en donde la etapa a) comprende además capturar una imagen característica del primer usuario y/o del segundo usuario, en donde dichas imágenes características están incluidas en la captura de pantalla realizada. 4. The method of the preceding claims, wherein step a) further comprises capturing a characteristic image of the first user and / or the second user, wherein said characteristic images are included in the screenshot made.
5. El método de las reivindicaciones anteriores, en donde previamente a la realización de la etapa b), la captura de pantalla realizada se almacena en una memoria del dispositivo de computación. 5. The method of the preceding claims, wherein prior to performing step b), the screenshot made is stored in a memory of the computing device.
6. El método de la reivindicación 5, en donde dicho almacenamiento es temporal. 6. The method of claim 5, wherein said storage is temporary.
7. El método de la reivindicación 2, en donde la información obtenida en la etapa c) se almacena en una memoria del dispositivo de computación, y en donde el método comprende además comparar dicho nombre del archivo subido/compartido con un archivo previamente almacenado y del mismo nombre. The method of claim 2, wherein the information obtained in step c) is stored in a memory of the computing device, and wherein the method comprises also compare the name of the uploaded / shared file with a previously stored file of the same name.
8. El método de la reivindicación 2, en donde la información obtenida en la etapa c) se almacena en una memoria del dispositivo de computación, y en donde el método comprende además identificar acciones sobre el archivo subido/compartido y/o detectar posibles usos inadecuados o no autorizados del mismo. The method of claim 2, wherein the information obtained in step c) is stored in a memory of the computing device, and wherein the method further comprises identifying actions on the uploaded / shared file and / or detecting possible uses inappropriate or unauthorized of the same.
9. Programa de ordenador que incluye instrucciones de código que cuando se implementan en un dispositivo de computación implementan un método según una cualquiera de las reivindicaciones 1 a 8. 9. Computer program including code instructions that when implemented in a computing device implement a method according to any one of claims 1 to 8.
PCT/ES2019/070384 2019-06-05 2019-06-05 Method and computer programs for monitoring content uploaded/shared to computer applications or platforms WO2020245475A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/ES2019/070384 WO2020245475A1 (en) 2019-06-05 2019-06-05 Method and computer programs for monitoring content uploaded/shared to computer applications or platforms

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/ES2019/070384 WO2020245475A1 (en) 2019-06-05 2019-06-05 Method and computer programs for monitoring content uploaded/shared to computer applications or platforms

Publications (1)

Publication Number Publication Date
WO2020245475A1 true WO2020245475A1 (en) 2020-12-10

Family

ID=73652893

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/ES2019/070384 WO2020245475A1 (en) 2019-06-05 2019-06-05 Method and computer programs for monitoring content uploaded/shared to computer applications or platforms

Country Status (1)

Country Link
WO (1) WO2020245475A1 (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20060104270A (en) * 2005-03-30 2006-10-09 (주)펄스미디어 File security system to track file leak history
US20110184982A1 (en) * 2010-01-25 2011-07-28 Glenn Adamousky System and method for capturing and reporting online sessions

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20060104270A (en) * 2005-03-30 2006-10-09 (주)펄스미디어 File security system to track file leak history
US20110184982A1 (en) * 2010-01-25 2011-07-28 Glenn Adamousky System and method for capturing and reporting online sessions

Similar Documents

Publication Publication Date Title
US11451535B1 (en) System, method and computer program product for credential provisioning in a mobile device platform
ES2669276T3 (en) System and method to control authentication attempts
US20220029803A1 (en) Protecting data using controlled corruption in computer networks
WO2015188277A1 (en) Methods, systems and computer program product for providing encryption on a plurality of devices
US8819067B2 (en) Non-deterministic audit log protection
JP2016503936A (en) System and method for identifying and reporting application and file vulnerabilities
EP2803011B1 (en) Detection of invalid escrow keys
EP2924953A1 (en) Method and system for encrypted data synchronization for secure data management
KR102542213B1 (en) Real-time encryption/decryption security system and method for data in network based storage
US20210377013A1 (en) Generation of encryption keys using biometrics
Vaudenay et al. Analysis of swisscovid
US20200028689A1 (en) Location-based and time-based photo authentication
US20240089095A1 (en) File encrypting method and device
KR101639258B1 (en) Apparatus and method for protecting personal information of recorded image, and computer-readable recording medium having thereon computer program for performing the same
Eiza et al. Keep calm and carry on with cybersecurity@ home: A framework for securing homeworking IT environment
US11251943B2 (en) Sharing a secret between an isolated device and a network connected device
EP3203407A1 (en) Information processing method and information processing device
CN114070571B (en) Method, device, terminal and storage medium for establishing connection
CN113228016A (en) Apparatus and method for luxo software decryption
CN108599935B (en) Key generation method and device and offline key generation equipment
US11706214B2 (en) Continuous multifactor authentication system integration with corporate security systems
WO2020245475A1 (en) Method and computer programs for monitoring content uploaded/shared to computer applications or platforms
US20200202025A1 (en) Method to track the dissemination of a data set
US11762973B2 (en) Auditing of multi-factor authentication
CN106845253B (en) Historical operation record encryption method and device

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19932065

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 19932065

Country of ref document: EP

Kind code of ref document: A1